000080)='devices.deny\x00', 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000000c0)={{0x0, 0x1f, 0x1535, 0xfffffffffffffffb, 0x9, 0x9, 0xfffffffffffffffd, 0xffff, 0x0, 0x2, 0x3, 0x7, 0x90, 0x23b, 0x4}}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000010c0)={{r2, 0x9f8, 0x0, 0x99f, 0x2, 0x7ffffffb, 0x1, 0x1000, 0x400, 0xc6, 0x0, 0x400, 0x7, 0x3, 0x5ca}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000002100)={'wg1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000021c0)={&(0x7f00000020c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000002180)={&(0x7f0000002140)=@bridge_getvlan={0x40, 0x72, 0x20, 0x70bd2c, 0x25dfdbfc, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x1}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x4004084) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) sendmsg$xdp(r0, 0x0, 0x0) 10:28:55 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) 10:28:55 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a00), r1) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 10:28:55 executing program 5: mount_setattr(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8200, &(0x7f0000000080)={0x0, 0x8, 0x100000}, 0x20) 10:28:55 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000039c0), r0) sendmsg$IEEE802154_LIST_IFACE(r1, &(0x7f0000003b80)={0x0, 0x2, &(0x7f0000003b40)={&(0x7f0000003ac0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:28:55 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000000c0)={{0x0, 0x1f, 0x1535, 0xfffffffffffffffb, 0x9, 0x9, 0xfffffffffffffffd, 0xffff, 0x0, 0x2, 0x3, 0x7, 0x90, 0x23b, 0x4}}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000010c0)={{r2, 0x9f8, 0x0, 0x99f, 0x2, 0x7ffffffb, 0x1, 0x1000, 0x400, 0xc6, 0x0, 0x400, 0x7, 0x3, 0x5ca}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000002100)={'wg1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000021c0)={&(0x7f00000020c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000002180)={&(0x7f0000002140)=@bridge_getvlan={0x40, 0x72, 0x20, 0x70bd2c, 0x25dfdbfc, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x1}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x4004084) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) 10:28:55 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 10:28:55 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) 10:28:55 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x8200, &(0x7f0000000080)={0x0, 0x8, 0x100000}, 0x20) 10:28:55 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0xa0502, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000040)={0x0, 0x0, "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", "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"}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000010c0)={'gretap0\x00', &(0x7f0000001040)={'sit0\x00', 0x0, 0x20, 0x700, 0x2, 0x401, {{0x14, 0x4, 0x2, 0x0, 0x50, 0x67, 0x0, 0x3, 0x4, 0x0, @empty, @loopback, {[@lsrr={0x83, 0x1b, 0xb, [@multicast2, @multicast1, @multicast2, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x32}]}, @generic={0x94, 0xd, "8cd20b1efaf750314a2d97"}, @generic={0x89, 0x11, "6dd6968451b313f9592c7b48211429"}]}}}}}) sendmsg$xdp(r0, &(0x7f0000002480)={&(0x7f0000001100)={0x2c, 0x9, r1, 0x37}, 0x10, &(0x7f0000002400)=[{&(0x7f0000001140)="3c09c293aef73216d19bf288f1712a7575fd286f41cfe7ed61d7d1719746c45d9e57477f014d91f34c5d25ade3b377800bb6f2486e11ab802ac2ec7b408c65d400b12ac8b767dad819611c34612cffe650bb74d5f86af413b032bf26d178ee2099258c7022b88dc1af", 0x69}, {&(0x7f00000011c0)="c8a9954f5e6a32fb1be61d746021c58dccc68117fffd0cfce36d633e089c77ed5a66f4ecc9d2752332bc664a5b546eb01442cc64b215b286a41d93d1ebe79b8ddf43b9972e9b81e65517dc9e667971c6ac08f10a121074f9f57962a6c2b509f5004c56af137495cd53f9ec78c2323397e01287ac28fda9079859f051b14b0afd001a2016150c8dc61d798d489daa9c", 0x8f}, {&(0x7f0000001280)="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", 0x1000}, {&(0x7f0000002280)="315fb295e7a92f11504ce5591365df903a", 0x11}, {&(0x7f00000022c0)="a87ad95184fe49afa4d82aca52ac2a2457e28391aa1cba9335a042bad2f77c0e8ea67bc9918ab99e402648c394ddd6c749c227708f66c2fd6f2d4612d5cb7a497be53945b4ba2ee44a42732502b1e654cee3bfd64516675e48455b852cdea85cefa12e591d4039416eee254c78e85f4ebfd363958b23505fda3bea905473412ad0bb04992eb6069e8ab305352ad36a229f155f219f60200050d0db67f6f0644b10964ffd4f4bc0a40e85678dd79af58035ba0d50ced217323fdba72d56814f3d73f110caca0b52ea10067a5ab6a2df67ba099c6e", 0xd4}, {&(0x7f00000023c0)="d655d45be4480bccc931943a01e000967cb0d90fa1f0c086277ccdd9f5", 0x1d}], 0x6, 0x0, 0x0, 0x40010}, 0x1) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, &(0x7f00000024c0)={0x1, 0x1, 0x1, r1, 0x6}, 0xc) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000002500)={0x0, 0x8000000000000001, 0x9, 0x1}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000002900)={r2, 0x8, 0x925, 0x1}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r3, &(0x7f0000002dc0)={&(0x7f0000002d00)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000002d80)={&(0x7f0000002d40)={0x2c, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_ADDR(r4, &(0x7f0000002f00)={&(0x7f0000002e00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000002ec0)={&(0x7f0000002e40)={0x78, 0x0, 0x800, 0x70bd26, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x78}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEV(r5, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)={0x14, 0x0, 0x8, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000003180)={&(0x7f0000003040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000003140)={&(0x7f00000030c0)={0x5c, 0x0, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20008080}, 0xc000) 10:28:55 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a00), r1) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 10:28:55 executing program 1: openat$tun(0xffffffffffffff9c, 0x0, 0x41, 0x0) 10:28:55 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0xa0502, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000040)={0x0, 0x0, "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", "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"}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000010c0)={'gretap0\x00', &(0x7f0000001040)={'sit0\x00', 0x0, 0x20, 0x700, 0x2, 0x401, {{0x14, 0x4, 0x2, 0x0, 0x50, 0x67, 0x0, 0x3, 0x4, 0x0, @empty, @loopback, {[@lsrr={0x83, 0x1b, 0xb, [@multicast2, @multicast1, @multicast2, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x32}]}, @generic={0x94, 0xd, "8cd20b1efaf750314a2d97"}, @generic={0x89, 0x11, "6dd6968451b313f9592c7b48211429"}]}}}}}) sendmsg$xdp(r0, &(0x7f0000002480)={&(0x7f0000001100)={0x2c, 0x9, r1, 0x37}, 0x10, &(0x7f0000002400)=[{&(0x7f0000001140)="3c09c293aef73216d19bf288f1712a7575fd286f41cfe7ed61d7d1719746c45d9e57477f014d91f34c5d25ade3b377800bb6f2486e11ab802ac2ec7b408c65d400b12ac8b767dad819611c34612cffe650bb74d5f86af413b032bf26d178ee2099258c7022b88dc1af", 0x69}, {&(0x7f00000011c0)="c8a9954f5e6a32fb1be61d746021c58dccc68117fffd0cfce36d633e089c77ed5a66f4ecc9d2752332bc664a5b546eb01442cc64b215b286a41d93d1ebe79b8ddf43b9972e9b81e65517dc9e667971c6ac08f10a121074f9f57962a6c2b509f5004c56af137495cd53f9ec78c2323397e01287ac28fda9079859f051b14b0afd001a2016150c8dc61d798d489daa9c", 0x8f}, {&(0x7f0000001280)="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", 0x1000}, {&(0x7f0000002280)="315fb295e7a92f11504ce5591365df903a", 0x11}, {&(0x7f00000022c0)="a87ad95184fe49afa4d82aca52ac2a2457e28391aa1cba9335a042bad2f77c0e8ea67bc9918ab99e402648c394ddd6c749c227708f66c2fd6f2d4612d5cb7a497be53945b4ba2ee44a42732502b1e654cee3bfd64516675e48455b852cdea85cefa12e591d4039416eee254c78e85f4ebfd363958b23505fda3bea905473412ad0bb04992eb6069e8ab305352ad36a229f155f219f60200050d0db67f6f0644b10964ffd4f4bc0a40e85678dd79af58035ba0d50ced217323fdba72d56814f3d73f110caca0b52ea10067a5ab6a2df67ba099c6e", 0xd4}, {&(0x7f00000023c0)="d655d45be4480bccc931943a01e000967cb0d90fa1f0c086277ccdd9f5", 0x1d}], 0x6, 0x0, 0x0, 0x40010}, 0x1) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, &(0x7f00000024c0)={0x1, 0x1, 0x1, r1, 0x6}, 0xc) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000002500)={0x0, 0x8000000000000001, 0x9, 0x1}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000002900)={r2, 0x8, 0x925, 0x1}) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f0000002dc0)={&(0x7f0000002d00)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000002d80)={&(0x7f0000002d40)={0x2c, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 10:28:55 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x8, 0x100000}, 0x20) 10:28:55 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000000c0)={{0x0, 0x1f, 0x1535, 0xfffffffffffffffb, 0x9, 0x9, 0xfffffffffffffffd, 0xffff, 0x0, 0x2, 0x3, 0x7, 0x90, 0x23b, 0x4}}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000010c0)={{r2, 0x9f8, 0x0, 0x99f, 0x2, 0x7ffffffb, 0x1, 0x1000, 0x400, 0xc6, 0x0, 0x400, 0x7, 0x3, 0x5ca}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000002100)={'wg1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000021c0)={&(0x7f00000020c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000002180)={&(0x7f0000002140)=@bridge_getvlan={0x40, 0x72, 0x20, 0x70bd2c, 0x25dfdbfc, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x1}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x4004084) 10:28:55 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a00), r1) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r2, 0x0, 0x0, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 10:28:55 executing program 1: openat$tun(0xffffffffffffff9c, 0x0, 0x41, 0x0) 10:28:55 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0xa0502, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000040)={0x0, 0x0, "c05bd7d14e9c0baa33bac6b9586ce2f8dd4384f162c04567d68432aedf100bcb5ae51393c464bca9169b4e2896e5023dbbb8957635302a0c0b7316ca48db80cb271e63323cd5a4882f342424376d56dbce320509ec5bc7f22aba17fa10cebe3e00e466b8be6a5794815befd4b173c5a3d2a65455e396fb7642d7b3f11365b9405ba0ac2c90c891ba72a6d985827ddacf6832803e1b421d665415bb6fd90100018712df8479f213c5c58ec9e66fa2b4adb94f50ecc2ca6896596be7ad3ecadb8012a84b7d9ee81ca161c56acb01c7a01c2321870b5118dac52c1a20cea421dff23456ff95368d7bb349834490c8f3700eee83f873a1bec52c0d1a2572ed974369", "3ba2be79822557aee8d71900e4372883e868cdcb7694ff63aff57bbe3f28d1fd2a67fbe4d9f741d2d1933304a473bb816d13358018a5c0e05e4804d1c0336c09f6e0ee38777137b98683411d869dac95f9cb0c9388b2584038c77bc08619892a6fc68fc58936ca085caedbd61b7e938c2f05bfd581ba2a962b54c722d491161de7e5878f48912766bc1a34205332e24e607c5ba48dd97da482beb5364a3a47fbd100e088fdb45150eeb3757385e09cc693440d3dafd881fb5d4be06dd2a29055e23e714b712aa61ff9d3afbfa4ccf8a88f8f1a7a2a7a4e9fe8161ba6fa56e504c7173497e70b8f6af653ecbb1fde7f415a150fd71bcae4cb10f4d0e23e82b1200acdb45a5b6d085366b668a3e9dedc228215ec2deefc5a259a17054b5e3c28dd5a933b54ae249494d4e2e71e7acd4664c3fe68f2f42edacb92c79589d890fdfc49ec887e4035b9705547b7ccadcecb79e050fb54710a1ad9df7d75e2dee2757ee496d6b6c642791299a4a9739ec99d7a8c2f0cf69c0d6979e76cbaa6310191275094c268ec1d08522d115704dd8d278d52170f949abba7f2af979aff487296148a3520e4d4c2fea2dbef1591047d4051e72cc8d3b3b8cb4c60bc72b4746a475585fd9ba2bf0ac756acd111834078f6e5387939e78d48de97335f8cef1b457824395720d5edd153d42165f1ea0e2dd7241f09359aecfcc6ff44f753ed4232be03bb4d29d59daa93cb3ab3a97d9c8dd29de2d4364ab3c755b6923191e8b6922a59c06b328d8fb467262661b7226f7fc3332f736e0080c9456339f5c1da53d0cddb9b51791c3c78736a938538a3785c89719e07b2b58c5a5b2c5eed8a21b04df1071b9eca7e7ac9b903b0f87d591906665ee6b1614c4bc6a528071462e99c70c7c7e18714e5eddedf3a0d1b705e1aec82ff3a8614da0eacfe679b31e218374a961d6d414f8706d2752d76f1b5219df50790e097c9a8962d03366a56b09baa8ea7b01876f251097dc027fa3b938d3208f7765b44d31d5ce9a1f2ab73f3e5155696ddcac0088278b5af9ab26780df22fd93d9a094fcaeaf6a75d693d69b3b255628a8250092334e3e4db5b3b96bd9cedff85147c88bd8ad1ea5f1171b217b1f2ce3b5dc5420a77559e64f8941f136b4ae3abae8dbe55c07de534f3c4207b27854848b4b630a550c10333bb625b0e1b8d21228f1ab2994e62143835f64677625297c933e52610e2394aec2e2c69073008c6f731d07ccb97ad4ee531bb544dc9642e4c0f121051071e05a790bef33dcb7e2d48bc54a7a0913c8a97102a2a449ee17e9ccecc3055410c71d53ae53fe90e603c4776e6895c19121ab54abebd393031373eb27b64e8feb0f3f9cda14c94e65470933df246d8f5e72f6a794b4e2c48ec42f470a1dadbf3a653cce040278d1733ce3e8f5da55a23d20a75e324c67c951b9121e0fc178d170ad0d51c6a8689fb866a80fd5edd345eb1a8aad71256ee04315357d4fe36b4ae2757451c2289e61f416121c2e163badef53f119af16310c7b2dd2731109b0d22e5bb274b42d2c16df5079a39580fef752d30f77330912f31376d6cd751a81c63e7aec7d3708e10404f8c75f68749d15d5794a41f374ae46062ae530df4f955b6de1fb15b4d3d8b35c5a751433602286dab643946ecdc986ad85be70dd3e66b68187333df63a461da5788887d49e7991af6bf47b413975aeddd80adf1639e6108b4a245c4d2945ed996971599d89039955903847b13cfd65be2c0feabbf40a5a6d3ead04c30412fcb011c46ace1ff8bb6b39cdd700e61baf1b0a5a502945615b75b34e1d4fe76d05be594af3b5d86a0ffe74e377a77643122e5f16c186c83fddc3ab4284e904b2a0e83a8b90c22200c733846720c5b50eb4b78af4dddd3698b4639eeea3812ff5540a0f0673080eb75f3da431464b4f68526d08f99ea427b34c359f88c3319fe2e1d30cc81e9600f22fe5e36b049858840130e8ada3b3881b126ebbc8d483e5aa63f540e4ce0cc5ac9c3ac0303757bc855108e0e5c1783eb52f960df2f9b91fae8258bfadaf1c06d34dd8c40a92a15eb16c47220cc7d936ac9d265e2dd641d1ac753b4d4c27e7e2f261e4799d3f129105dc2f7e2a637ba3997579b0094336e419b54893b7d43535fd1e2317b0afa6684d011499ddb02ed3730883888c7b2afe7702b2df81c9b9bf06f37c2008fa09227a7118314571aa0368551f3e10be8c71c5a9593793f5e6f3579e50ba53d639ccc84165188296ae6fe13b2d6f526b233d8681f19b73e9b732d9d5d40afd20f0e8f8470e1d2e153580e0270d4bf5f7eeb3ef20b81618cf8c786c9f67bf4df9e89f7f26f6088a1701014ad5a45a352d2c37b979174305dcb9ef350b6660d577eab5f22691c7b4f6d7bd98daf8ec35e56584d365a181847a4176350802a6852603cc12c2f82f8c23ca9ecd12c7c542429b8362b6650f81743b774b8216709f214af018b2a0207d2b777c3e5f42e08f5213ea446136a5925dc39e29732cbd447811006ac63a060495139cec7fa55654a7e9ed85f37a9d20b24ea76523737704ceb4a0ad54dabdbf9703a0cf913da17c55234f1014db898be3faad9dbde65885c2fb89d783d569224eeaf04ec5dcfdbe16db4cc87952298251b5a62b4d74fa4752523eeda28b4cec9d2e198e4e8823284c075eedb7a15811e3eea090de9bf1c29d6e32c61d80cfd79e97cb552f4aa94437fe9b40686182994c3902c87e590c7afbe33bec71040b20e21252a498aa540356a7e009fd36973bbc058f1dd57e29338134cdd7416d9a2028a1f5c36aa88b69b7c5e5ade6cfc14e2223bccdb3f632c9db9a2084939e13b235fc5789ba3ede452306f5530df385ef8af0231978207317e60e983b4d421b660a9c79cebf811eb6fe98bf82c385e7b5209ce7e9c443b0e9f6059a59cd158664fae8fb448b81a14e459f6115e8a126e5a779f502b40bdbe18ee7292b409305ed07869423176ef09cbca6143f1f178d3d5783e70e71dc8cad647f294edd1230d9b12529afafd601757251c941a0820d16a65d350c0b6f901d316f82cf05e8e7c9bbe756f6af1cacaf4e0e33db205413c5bd92ef69a6e99e807d03c6dca580e31948bc1b3df5eeac789d396abcde0d77f5d714ec2779a3a774f43fa028171a64ad703de5b72a207321213423ee9057866aaca10e942a2af5845156440ca3ee59d850246e92720d2c60f613549a9cd6a3ef6c253263ef1a13562fd8f81be4d5a87cc74788fd116555587c6be2fedccec696a881d182d0660644b9caab827bf2120b80be69f9b08a86f284796850bedc97faa071347d5afc21c29835b814b6091f525c23b85545949b2df4782c8b61e52563b0a6af074fd4b368adbc10db79251b2251f37066b4c831339652041cc87b33e228588a4c2326dacf2a12fe1e1c5e42a419472dc749acece641807f97ab8f74cac3688414dc07a26eabd8e5b7b1897661afade0b546a4a7b55bcacc402ecf0335ceeee868b2f036fecbdc260c482af91524f0a23ab09ccbf47c522c57c9702c479c11cdc4521be3109054fb416e5f2e250177f73edfd36e2d82ed97ad6d2587a61252ecedeb7e88274331ffc69ea8f78501bfc9cb0d441e69fe10e2f5517c10648156645e7c3b98d68d4a42236c77eeef379e443b2a5ccfbe0a9f7791513c41352e3c8c1cf0e353618ca5fefcefd18fcdf7f8fbeebb394144c98e89c5083bf8a9427f3d3075b8ac823c8db379cd7d4c30ff2a746f896e8bb1006c3fd46161db3cbe38dc35aa64b1283931abd2324fdf2eca249d15cec4741f6f8c28e7bf4343e91e0f49e2d3258e7bcd6aabbf2ab17d7b50578c9c83cca35e14bf1804ce3fc7cee597bc5291d2510c348518a9535fa9b45af89e973eb365a850951ec78f5541a0725afdadaa41bafd63ff213240b039e72ff2077ce1ffcb321fc32f1b958224ebb7f1e09d287e54ec3049c93d2d513fd0632d90e2db98f62661adeeddd3169ecf9aede6426fb5b812a99e38fa10b62a81a1670d8f7fef5dba0bb139d27af2e19a9046336e6620e021144fac1b7faa1591599dcffe2a1c434975e13f9bd393c1fcf2295beb08ce90711dc1a96d9ab0b7bff0cb7d4f96ca1129ed1e8c90479313f4b1d0ac45d590b3457cabefbac6736c5bfa28328dbf315636a2a2826aaec94980a0fea1f811f0870d5527a1def0df95a00cd6658e776e5283f3f9f50da550142e22005fdb703635501b259b912ae96218c155fe711ac306e85f39a2e1248641d10de445c1be188390bb4fb33a25d1fa5be79f21465a9628fb7ee396cdc2b57bfd50b306e384846e760b047ae1a40ce3d49998a62641d033b0b7fc8af80c30860dbf4c9543d21297c20387ba3608cd2bc2bf3d2897df3aa93564d6f6026a3cfec6926f2c60aa6200ed0e06f2a832a817e31287841242d54d630eabfc1941075127e3468abb7cb344867b74a7dd43ca18c2bbbcf5692f27388e81ffb7fbeaaa143916552af98a2ea09f743041f80836824b93f50cd7a1a54ebde5f43c40f707a99b98864522701392e3dba09f723c3d9741789bed5d325335509bdeeca91ae988d8204907da4623f08f11a773c28af2811458966fe84afbe835bd5af9fcf3062520519e8ba8d5cbeb401a0a0bd43004b50cf5abfa14863338f21ce436737d69ba186a3082f56ce911f5652aa3c17e3f31cb55dc5089b027e28336230948206bdac86b56ea38f992dc6735cfa6dd57b5e5e0065de3d4f638bae757214f498c4a6d9e1dbdead3d999380d34860937b2a4232db999eb0e5f76951fb13e21872a5794cfd4f224ac9096c17dadd8e8296b80d7b5547429665373d9a53469527af4e199b3b0a2ff641fe83ae22dbafac7b2152bb6a123e4a9e9e8e8ac50ad03bceae9d11291c66372f782c6620c910fbceb0c9902386785703fb45d08c41a3c7205fd3a8a6bd486f52cc3c55212454c8759d2a979a49d989ea5584ddead9d38ba569ee632e505dc4579fd4164e1ac15c0705f612049842b4ad92c018de29c75b99e7a84550b97a30c040d408d19bec227521209c6efcfbef963be6c05ef5b374811936e53ccb5b8c0c0e578fea8d1b5343282849b1e69c704fb007b3ba1d7b0cb639987f3c54b1ea1ed7ac976360b5b741a86a5543e3e0345690194b6f0cb54cbec2ea173e1c07d6f92ceeda0242b1fc6930d2b2e677a19667cc446797a37d1f55af18e9601eab7fb78ea35dc2dee9f5b4820a459f0d93ade9ec81d9eb824bc6404b0dbbd25ce848f0ce9d5f7b24255356402cde39a16d8a54845e6d50e09ab51c43d337d48c3220223833bd87c6cf87f3d1ec0f546603eb61d65514752c94137316e0bbfcece9723cd46f7c10eef9540f1d9e97a28f2dc7deac7bb26581eed0cc819fbfaa7"}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000010c0)={'gretap0\x00', &(0x7f0000001040)={'sit0\x00', 0x0, 0x20, 0x700, 0x2, 0x401, {{0x14, 0x4, 0x2, 0x0, 0x50, 0x67, 0x0, 0x3, 0x4, 0x0, @empty, @loopback, {[@lsrr={0x83, 0x1b, 0xb, [@multicast2, @multicast1, @multicast2, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x32}]}, @generic={0x94, 0xd, "8cd20b1efaf750314a2d97"}, @generic={0x89, 0x11, "6dd6968451b313f9592c7b48211429"}]}}}}}) sendmsg$xdp(r0, &(0x7f0000002480)={&(0x7f0000001100)={0x2c, 0x9, r1, 0x37}, 0x10, &(0x7f0000002400)=[{&(0x7f0000001140)="3c09c293aef73216d19bf288f1712a7575fd286f41cfe7ed61d7d1719746c45d9e57477f014d91f34c5d25ade3b377800bb6f2486e11ab802ac2ec7b408c65d400b12ac8b767dad819611c34612cffe650bb74d5f86af413b032bf26d178ee2099258c7022b88dc1af", 0x69}, {&(0x7f00000011c0)="c8a9954f5e6a32fb1be61d746021c58dccc68117fffd0cfce36d633e089c77ed5a66f4ecc9d2752332bc664a5b546eb01442cc64b215b286a41d93d1ebe79b8ddf43b9972e9b81e65517dc9e667971c6ac08f10a121074f9f57962a6c2b509f5004c56af137495cd53f9ec78c2323397e01287ac28fda9079859f051b14b0afd001a2016150c8dc61d798d489daa9c", 0x8f}, {&(0x7f0000001280)="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", 0x1000}, {&(0x7f0000002280)="315fb295e7a92f11504ce5591365df903a", 0x11}, {&(0x7f00000022c0)="a87ad95184fe49afa4d82aca52ac2a2457e28391aa1cba9335a042bad2f77c0e8ea67bc9918ab99e402648c394ddd6c749c227708f66c2fd6f2d4612d5cb7a497be53945b4ba2ee44a42732502b1e654cee3bfd64516675e48455b852cdea85cefa12e591d4039416eee254c78e85f4ebfd363958b23505fda3bea905473412ad0bb04992eb6069e8ab305352ad36a229f155f219f60200050d0db67f6f0644b10964ffd4f4bc0a40e85678dd79af58035ba0d50ced217323fdba72d56814f3d73f110caca0b52ea10067a5ab6a2df67ba099c6e", 0xd4}, {&(0x7f00000023c0)="d655d45be4480bccc931943a01e000967cb0d90fa1f0c086277ccdd9f5", 0x1d}], 0x6, 0x0, 0x0, 0x40010}, 0x1) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, &(0x7f00000024c0)={0x1, 0x1, 0x1, r1, 0x6}, 0xc) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000002500)={0x0, 0x8000000000000001, 0x9, 0x1}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000002900)={r2, 0x8, 0x925, 0x1}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r3, &(0x7f0000002dc0)={&(0x7f0000002d00)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000002d80)={&(0x7f0000002d40)={0x2c, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_ADDR(r4, &(0x7f0000002f00)={&(0x7f0000002e00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000002ec0)={&(0x7f0000002e40)={0x78, 0x0, 0x800, 0x70bd26, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x78}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEV(r5, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)={0x14, 0x0, 0x8, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000003180)={&(0x7f0000003040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000003140)={&(0x7f00000030c0)={0x5c, 0x0, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20008080}, 0xc000) 10:28:55 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x400, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}}, 0x0) 10:28:55 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x8, 0x100000}, 0x20) 10:28:55 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000000c0)={{0x0, 0x1f, 0x1535, 0xfffffffffffffffb, 0x9, 0x9, 0xfffffffffffffffd, 0xffff, 0x0, 0x2, 0x3, 0x7, 0x90, 0x23b, 0x4}}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000010c0)={{r2, 0x9f8, 0x0, 0x99f, 0x2, 0x7ffffffb, 0x1, 0x1000, 0x400, 0xc6, 0x0, 0x400, 0x7, 0x3, 0x5ca}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000002100)={'wg1\x00'}) 10:28:55 executing program 1: openat$tun(0xffffffffffffff9c, 0x0, 0x41, 0x0) 10:28:55 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a00), r1) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r2, 0x0, 0x0, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 10:28:55 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x8, 0x100000}, 0x20) 10:28:55 executing program 3: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x8, 0x100000}, 0x20) 10:28:56 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 10:28:56 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000000c0)={{0x0, 0x1f, 0x1535, 0xfffffffffffffffb, 0x9, 0x9, 0xfffffffffffffffd, 0xffff, 0x0, 0x2, 0x3, 0x7, 0x90, 0x23b, 0x4}}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000010c0)={{r2, 0x9f8, 0x0, 0x99f, 0x2, 0x7ffffffb, 0x1, 0x1000, 0x400, 0xc6, 0x0, 0x400, 0x7, 0x3, 0x5ca}}) 10:28:56 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x8200, 0x0, 0x0) 10:28:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a00), r1) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r2, 0x0, 0x0, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 10:28:56 executing program 3: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x8, 0x100000}, 0x20) 10:28:56 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x400, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}}, 0x0) 10:28:56 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 10:28:56 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000000c0)={{0x0, 0x1f, 0x1535, 0xfffffffffffffffb, 0x9, 0x9, 0xfffffffffffffffd, 0xffff, 0x0, 0x2, 0x3, 0x7, 0x90, 0x23b, 0x4}}) 10:28:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a00), r1) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 10:28:56 executing program 3: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x8, 0x100000}, 0x20) 10:28:56 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x400, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}}, 0x0) 10:28:56 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 10:28:56 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) 10:28:56 executing program 3: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:28:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a00), r1) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x1}, 0x14}}, 0x40000) 10:28:56 executing program 4: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) 10:28:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a00), r1) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:28:56 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x400, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}}, 0x0) 10:28:56 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x400, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}}, 0x0) 10:28:56 executing program 3: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:28:56 executing program 4: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) 10:28:56 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x400, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}}, 0x0) 10:28:56 executing program 3: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:28:56 executing program 4: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) 10:28:56 executing program 2: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:28:56 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x400, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}}, 0x0) 10:28:56 executing program 2: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:28:56 executing program 3: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x100000}, 0x20) 10:28:56 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x400, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}}, 0x0) 10:28:56 executing program 2: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:28:56 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) 10:28:56 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x400, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}}, 0x0) 10:28:56 executing program 3: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x100000}, 0x20) 10:28:56 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) 10:28:56 executing program 3: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x100000}, 0x20) 10:28:56 executing program 2: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x100000}, 0x20) 10:28:56 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) 10:28:56 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x400, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}}, 0x0) 10:28:56 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) 10:28:56 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) 10:28:56 executing program 2: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x100000}, 0x20) 10:28:56 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) 10:28:56 executing program 3: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x8}, 0x20) 10:28:56 executing program 2: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x100000}, 0x20) 10:28:56 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) open(0x0, 0x680002, 0x0) 10:28:56 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) 10:28:56 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x400, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}}, 0x0) 10:28:56 executing program 2: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:28:56 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) 10:28:56 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) open(0x0, 0x680002, 0x0) 10:28:56 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) 10:28:56 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_devices(r0, 0x0, 0x2, 0x0) 10:28:56 executing program 2: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:28:56 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) open(0x0, 0x680002, 0x0) 10:28:56 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) 10:28:56 executing program 2: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:28:56 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_devices(r0, 0x0, 0x2, 0x0) 10:28:56 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) 10:28:56 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x400, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}}, 0x0) 10:28:56 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_devices(r0, 0x0, 0x2, 0x0) 10:28:56 executing program 2: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x20) 10:28:56 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) 10:28:56 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) process_vm_readv(r1, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) 10:28:56 executing program 2: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x20) 10:28:56 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x20) 10:28:56 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) process_vm_readv(r1, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) 10:28:56 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x400, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}}, 0x0) 10:28:56 executing program 2: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x20) 10:28:56 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) process_vm_readv(r1, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) 10:28:56 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x20) 10:28:56 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) 10:28:56 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) process_vm_readv(r1, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:56 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x20) 10:28:56 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) process_vm_readv(r1, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:56 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) 10:28:56 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:28:56 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) process_vm_readv(r1, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:56 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:56 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) open(0x0, 0x680002, 0x0) 10:28:56 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) 10:28:56 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) 10:28:56 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:56 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:28:56 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) 10:28:56 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:28:56 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:56 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) 10:28:56 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:56 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 10:28:56 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) 10:28:56 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) 10:28:56 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) 10:28:56 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:56 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:56 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) 10:28:56 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:56 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) process_vm_readv(r1, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) 10:28:56 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:56 executing program 1: syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) 10:28:56 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) open(0x0, 0x680002, 0x0) 10:28:56 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) 10:28:56 executing program 5: syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:56 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}], 0x3, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:56 executing program 1: syz_open_dev$vcsu(0x0, 0x7, 0x54000) 10:28:56 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) process_vm_readv(r1, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:56 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r1}}, 0x58) process_vm_readv(r2, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) 10:28:56 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}], 0x2, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:56 executing program 1: syz_open_dev$vcsu(0x0, 0x7, 0x54000) 10:28:56 executing program 5: syz_clone3(0x0, 0x0) 10:28:56 executing program 1: syz_open_dev$vcsu(0x0, 0x7, 0x54000) 10:28:56 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:56 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) 10:28:56 executing program 5: syz_clone3(0x0, 0x0) 10:28:56 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) process_vm_readv(r1, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) 10:28:56 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) 10:28:56 executing program 0: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:56 executing program 1: syz_open_dev$vcsu(&(0x7f0000000080), 0x0, 0x54000) 10:28:56 executing program 5: syz_clone3(0x0, 0x0) 10:28:56 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) process_vm_readv(r1, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:56 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) 10:28:56 executing program 1: syz_open_dev$vcsu(&(0x7f0000000080), 0x0, 0x0) 10:28:56 executing program 0: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:56 executing program 5: syz_clone3(&(0x7f0000000300)={0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:56 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 10:28:56 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) process_vm_readv(r1, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) 10:28:56 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) 10:28:56 executing program 0: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:56 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) 10:28:57 executing program 5: syz_clone3(&(0x7f0000000300)={0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:57 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) 10:28:57 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) process_vm_readv(r1, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) 10:28:57 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:57 executing program 3: openat$vcs(0xffffffffffffff9c, 0x0, 0x7f89960a0c06e1fd, 0x0) 10:28:57 executing program 4: syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 5: syz_clone3(&(0x7f0000000300)={0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:57 executing program 3: openat$vcs(0xffffffffffffff9c, 0x0, 0x7f89960a0c06e1fd, 0x0) 10:28:57 executing program 5: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 4: syz_clone3(0x0, 0x0) 10:28:57 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) process_vm_readv(r1, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:28:57 executing program 3: openat$vcs(0xffffffffffffff9c, 0x0, 0x7f89960a0c06e1fd, 0x0) 10:28:57 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 5: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:28:57 executing program 4: syz_clone3(0x0, 0x0) 10:28:57 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 10:28:57 executing program 4: syz_clone3(0x0, 0x0) 10:28:57 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 10:28:57 executing program 2: syz_clone3(0x0, 0x0) 10:28:57 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) process_vm_readv(r1, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:28:57 executing program 5: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 4: syz_clone3(&(0x7f0000000300)={0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 2: syz_clone3(0x0, 0x0) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}], 0x7, 0x0) 10:28:57 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) 10:28:57 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 10:28:57 executing program 2: syz_clone3(0x0, 0x0) 10:28:57 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:28:57 executing program 4: syz_clone3(&(0x7f0000000300)={0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 5: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}], 0x6, 0x0) 10:28:57 executing program 2: syz_clone3(&(0x7f0000000300)={0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}], 0x5, 0x0) 10:28:57 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}], 0x4, 0x0) 10:28:57 executing program 4: syz_clone3(&(0x7f0000000300)={0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 2: syz_clone3(&(0x7f0000000300)={0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 5: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 3: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:28:57 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}], 0x3, 0x0) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}], 0x2, 0x0) 10:28:57 executing program 5: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 2: syz_clone3(&(0x7f0000000300)={0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 4: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 3: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}], 0x1, 0x0) 10:28:57 executing program 1: syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 3: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:28:57 executing program 5: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}], 0x1, 0x0) 10:28:57 executing program 3: process_vm_readv(0x0, &(0x7f0000001800), 0x0, 0x0, 0x0, 0x0) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}], 0x1, 0x0) 10:28:57 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 4: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 1: syz_clone3(0x0, 0x0) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:28:57 executing program 5: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:57 executing program 3: process_vm_readv(0x0, &(0x7f0000001800), 0x0, 0x0, 0x0, 0x0) 10:28:57 executing program 1: syz_clone3(0x0, 0x0) 10:28:57 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 4: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:28:57 executing program 3: process_vm_readv(0x0, &(0x7f0000001800), 0x0, 0x0, 0x0, 0x0) 10:28:57 executing program 1: syz_clone3(0x0, 0x0) 10:28:57 executing program 5: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:57 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, 0x0, 0x0, 0x0) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:28:57 executing program 1: syz_clone3(&(0x7f0000000300)={0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 4: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, 0x0, 0x0, 0x0) 10:28:57 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, 0x0, 0x0, 0x0) 10:28:57 executing program 5: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f00000018c0)=""/169, 0xa9}], 0x1, 0x0) 10:28:57 executing program 4: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 1: syz_clone3(&(0x7f0000000300)={0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f00000018c0)=""/169, 0xa9}], 0x1, 0x0) 10:28:57 executing program 5: syz_clone3(0x0, 0x0) 10:28:57 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:28:57 executing program 4: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f00000018c0)=""/169, 0xa9}], 0x1, 0x0) 10:28:57 executing program 5: syz_clone3(0x0, 0x0) 10:28:57 executing program 1: syz_clone3(&(0x7f0000000300)={0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {&(0x7f00000018c0)=""/169, 0xa9}], 0x2, 0x0) 10:28:57 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:28:57 executing program 5: syz_clone3(0x0, 0x0) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {&(0x7f00000018c0)=""/169, 0xa9}], 0x2, 0x0) 10:28:57 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:28:57 executing program 4: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:57 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 1: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {&(0x7f00000018c0)=""/169, 0xa9}], 0x2, 0x0) 10:28:57 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:28:57 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {&(0x7f00000018c0)=""/169, 0xa9}], 0x2, 0x0) 10:28:57 executing program 5: syz_clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:57 executing program 5: syz_clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:57 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) 10:28:57 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:28:57 executing program 1: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:57 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {&(0x7f00000018c0)=""/169, 0xa9}], 0x2, 0x0) 10:28:57 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:28:57 executing program 5: syz_clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:57 executing program 3: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:28:57 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {&(0x7f00000018c0)=""/169, 0xa9}], 0x2, 0x0) 10:28:57 executing program 0: syz_clone3(&(0x7f0000000300)={0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 1: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 2: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:57 executing program 3: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:28:57 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x7f89960a0c06e1fd, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x7, 0x54000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_clone3(&(0x7f0000000300)={0x800000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0xa}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r0}}, 0x58) process_vm_readv(r1, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/125, 0x7d}, {&(0x7f0000000480)=""/149, 0x95}, {&(0x7f0000001740)=""/144, 0x90}], 0x4, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) 10:28:57 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}, {&(0x7f00000018c0)=""/169, 0xa9}], 0x2, 0x0) 10:28:57 executing program 2: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:57 executing program 1: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/23, 0x17, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:57 executing program 3: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:28:57 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}, {&(0x7f00000018c0)=""/169, 0xa9}], 0x2, 0x0) 10:28:57 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0xa0502, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000040)={0x0, 0x0, "c05bd7d14e9c0baa33bac6b9586ce2f8dd4384f162c04567d68432aedf100bcb5ae51393c464bca9169b4e2896e5023dbbb8957635302a0c0b7316ca48db80cb271e63323cd5a4882f342424376d56dbce320509ec5bc7f22aba17fa10cebe3e00e466b8be6a5794815befd4b173c5a3d2a65455e396fb7642d7b3f11365b9405ba0ac2c90c891ba72a6d985827ddacf6832803e1b421d665415bb6fd90100018712df8479f213c5c58ec9e66fa2b4adb94f50ecc2ca6896596be7ad3ecadb8012a84b7d9ee81ca161c56acb01c7a01c2321870b5118dac52c1a20cea421dff23456ff95368d7bb349834490c8f3700eee83f873a1bec52c0d1a2572ed974369", "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"}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000010c0)={'gretap0\x00', &(0x7f0000001040)={'sit0\x00', 0x0, 0x20, 0x700, 0x2, 0x401, {{0x14, 0x4, 0x2, 0x0, 0x50, 0x67, 0x0, 0x3, 0x4, 0x0, @empty, @loopback, {[@lsrr={0x83, 0x1b, 0xb, [@multicast2, @multicast1, @multicast2, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x32}]}, @generic={0x94, 0xd, "8cd20b1efaf750314a2d97"}, @generic={0x89, 0x11, "6dd6968451b313f9592c7b48211429"}]}}}}}) sendmsg$xdp(r0, &(0x7f0000002480)={&(0x7f0000001100)={0x2c, 0x9, r1, 0x37}, 0x10, &(0x7f0000002400)=[{&(0x7f0000001140)="3c09c293aef73216d19bf288f1712a7575fd286f41cfe7ed61d7d1719746c45d9e57477f014d91f34c5d25ade3b377800bb6f2486e11ab802ac2ec7b408c65d400b12ac8b767dad819611c34612cffe650bb74d5f86af413b032bf26d178ee2099258c7022b88dc1af", 0x69}, {&(0x7f00000011c0)="c8a9954f5e6a32fb1be61d746021c58dccc68117fffd0cfce36d633e089c77ed5a66f4ecc9d2752332bc664a5b546eb01442cc64b215b286a41d93d1ebe79b8ddf43b9972e9b81e65517dc9e667971c6ac08f10a121074f9f57962a6c2b509f5004c56af137495cd53f9ec78c2323397e01287ac28fda9079859f051b14b0afd001a2016150c8dc61d798d489daa9c", 0x8f}, {&(0x7f0000001280)="816fb2f3422eb2559a5e8eb728391cef25402d82823dcb7fed8d076032f373a86da35fabda565de12b2f0d0630c14bd1256325bbf6ffa4beb196a3271b4b7b6742836ae1ada48ac4471083f7a686911932ad19e68739d163b89e154dde64f8842e226a8b93f141f1ea3132702706860f2e0b86eb6cde3a63efbf2fbb79245d5fcd6295562b40ebb1260e4d4a9cee7fa9446cdebb23651ad07a2b5803961e7b01025258d9afa4a5416f5e80165260a809182c9e10f21e8d0bfba4add612ab858a49d6eb7c192f4973da17310d405c024a0aaeb22d46cc9cc4229dfe668b439f12e92796540adc79ffdabc9167afd15741b75cd195e404741631ce26505b8fbe348a4f920c076d59aa4c996697a1ecef9f0119e50316065c2695cbcb644ead8bd0031e9959fecb5ee0a998cddaf526d83257a2d63139d8d2950dd0e5ccc8479df7e59d3afb0e1bc1002dbbbe80bc725d584c48247468e3785544d30a55997c4554836eb7dc7a363104798a3a07d5d0d622faa42093fbd5c128de4c0803e2bf4c4a6dcc62cd6a6e2bcc573b1d55685cd7d5dfd918889e9952963151d13ac5dc7be47d451e0983dbccf5a9938d7438f84b7be8530ecdaea80f9a551f90403c24d8962ab2522a8114d71bccaa5d0266da551adaa7401e78351566e83a39f79b0d2284610aabbf2a293aff032a397553e5a994feb2f90c783c99e04a35110018c41324a56972841c882208e81db6c1de3ad378cbb9eb13f25c853648b213d85e4df4e1a9142959fd0c7fbfcd5881d55a4ef9e17f17932f2751c54b586bca0071d6385fdf7fa08039d131c3e7bf1befcac962be0efaaac7c12c954e48cb655a3f1147dec8fe3b67a21a3812b3d28b328eb66c6a94b0f1391945b61e9181ea6cfb497944c55a50fae959b7ec57ec5339c52d9072ae928859cd0e2cdd62fb6339a0e3c419594abac52c295e99a7b44977c056f5ad91962ba542543f8594bee06cd9307d7a9e52dfa1bff099facc8790b746c33406a2b09dbe09bb78c6dbfc66d626c439227c6ffd6c5e64e63c753684d5e51ab667f040c5cf2445fab52b5b2ed094cfe7ace6578ca9b01e7d083eca4b6460c1cd2c50437a64a3a9941dac95f3c96d63c51d4fb73605433bd05f4d7ac054346098ff905c41702699d0a25ccbbf0c18fa60e309166c9d0ca0509f08ead379d1c917efbbb1158484ade863920d0f767f88fdec0da006b1351bd7e2e7af6307462fb048f8ad01526dff41cede7f37dadf19876f892e0aef0578255fb65f5bdf92d37cd0e79c8b89d2bbeec4bc3cb91c816225760fe88e96748e0e5a98207c1fabfe3c10627ebe22a8a57ea26db10ae3f406ab781c4872a5db7359b810cfc6b63daf52771ebee6da7780187847d58a7277930ea1d2057d082c3587d002f852ce33fe9919fb95f89c05b1fa178d46704ab161ff33ac0e4949abf13ba348b9d066c8e04acffff4243b52c0b9d328ce0a88883958f7dea26efb797ac560c70a975aa3c27d9fc590d5ae3a58a2b89a86715b6157e4f9093b1c6c996099d4cc964112f1c28e5f950222e5daa5809ad519ebeb3ee5edbc592d35310ca7b6d08049ceedb15301c9a5f9b4f90dbb512094fa88c1553b115a5d2107ff5fedbe0e265f549229d9fb06861c5e3140cac37eca805fcdb5cb335b4f871cc55b037fd583d82c84e5e3203370b9b04fc30adc5725fe7abb31f3dd040e9de5613ce1b83174f8e39899607140290d828ceb9192eb3afb3cc2ffb6f418d16fb8cf342e6c70659a0e50a00805bc345b5e4a175913eacb6531f2b2f818f264b65b25c5634aa2ccd7be31a0a70f90cad8b48c9eea77cf622926a996465ae822df96e42bebba855ab886514bbd3ffaa77c6177b7f241a05d2de0be1edde5fa0fc3fc3412219517ef1f5c577517bed43acf0b41b19315c52ffa67d6e1d96f74b622acd30358aebe65217e4cac0b123e00d392d9dba0c4626674123b5176715080dcfef835dd1b9f9a554ebd21ed3aa1b79e912d98308f1bd9e56b6d8c89bc041cf2ba6ad2916acb689dfa3197cdbbef0c650ca172436611e3924fac0ce2d02ed4766ae66a9aecc4078806c1ebe23cd5b210f052607daf96b1acd3c3b120d0fa6e34fd880411f1484a96dbcf967b86dbb45df98a8b22f229ad1fb690b2c57e15a4c2f1d3d826b3ac0a4785ddf0ee087a7022d804ca4306b753d7bab3374c202bd93c7d9000f7a3889f29df6359e9bd79a608ba0e644464015ae52bfde55a5e12ff25848ead3fc34499affc14bcb7f7e190075f02e50d39225e5f690db8754b6be38418b632ec375e7e006130b62ca86f69db5dfe93bd2bd68d6fa906850403f1e16ece0c54a0018b6cfdceb5fece1636e0558b3950d796b6250bb0b01406e744ddd30a2b8e32045bb21bf85d301ae952073fd7940f532c3fe5548938178489141c429618482914e75ab18001ff0dab7628897077a1bcba81bf904a5bfcfc3c99f7b90f4f401e8cd6f5053efc9cac275617cd663d53c88fbbc9aa63919ac9d7d663d122548e0bf87602daa39b73d3f9eece5511b5ddb57ed8aa8403b7d0cdf31717558315e582757bb0376f5413a88c4a395cc9692292e2dd83dbebdf194e028ee85fd8ee3cd1b4c99c6935cb05ea16926d5e709ce7c0298eaacba2ae0cd4aa5b97eb2c24662faf05fa1c910ab5c70615439810b6a1aabc9987a5a9f8761015cb4e00bf89ea4e42858e13c1f5c4c5feab6d43e686fe96415fb94dbcec93e3c925f9dc899d5ae5ee86d5816326c8d3da2114e914bcbfa4f7345619f1da369f8f9f74b313dbecbd12916063a0354429c38ae7af1b71b90c8b7a5b6cedd178715e2b522681a555bc5b54d60e4d6b48379ef43788e7a87fcf3a66bc6173ca8658b14449d13738cfbe93f859c4dbfa5e56b8e33b6f729597f41cdb095186b07e4302cd65383b7c4fca798561b046ee990ca3a52807a8e4939519262783fa2175e3a2fb7e36e5cd7a13db2c735eab815aa029b6ece1e964102ffa62e953f9e8918300bb545f3149c29a6c33d62fa8939d154f1b7e70eff7686ce703ddb4d0c856d5f3df52c12811ae44325bc2670803e1338abcd3080e24cd4f4f9d6bba11a64f22d7fed0f2d193c5c1dada0eb56279a48ac5592c59de6fab93084de63f8f1b9b133fbea62ca047a8f6037634b849a707df0ef87ad2b2a79818939f000a6a2539471ba5f9b6bb7012bb98f8782922eba08ea73e81dd60d27cec73816086be6271307b7bc742b476db832bec81b4bfa4e46faab8842065478bfbfd794ce2fdf37fe86ad525d188bbbeacdb778d895386bd29b92a57d5b0dd380a4b3816ab0c42ebd6a59a5f3856e8021f6b0f2c668096ce9c3abac8e47438950acfa4d6d7ef454b32768c880e36786f09a6fc3c8cef6cbc8a72ce1066140ffe407317b8d9e67961912c66710286d57adee8983a4c09e370e31f2d3c1c2b4ba39021b537ae462251e4c2731bacf74bf58119ec06a086169166b5455d408eb954ef5084a5b1646e4e4fe55c44597d449e5b99026a774a44e3a1298256b7e341f164908a1bdeb0bfb81caa5cf8395b9df5db9d22b3c1002eea38f288e8df3dba06541b52463416b5cf69b3a11b0b7bbab86b724902c4ad86364c528f64dcfe731bd2b78206728ff643730e1f6c97fc52049d8c5edcec17411d43725285414342c84a2637e37a5bcbf71c550b51d87b069a935f21466317557989cadd2347e0d6b83d852870a03006ef7fe1838bff1d44f629032868b2d24d9b0415b2fbfaa3ce6d8ce5af4ec33c6db0be58d8074be364d978c6d5c8fec880860436556e1ae6196a93040f1b356d7ec713de9e6421e9a55e7ebd9514e230a1c27a9aae540511087af0e4023f0088179a91210aa48e8a5153c12226b44e4402839d6a64cd3450e6b1865e76b73a3fa11ad7817c437fc8918523c052f224e192f343d87e65075d28ec457808ddc4675050c237c37bba73027ce12e2907a8aebb4094c3e0fafa7a264ec0b8598992e04899750bf8bc0523a76a1e49eb3a501a96d5516c89f11e3f946a983d8c694612518938e96b0940b156fd60429e610665fc599f5ad7e8b1aaf7f30d15bfa805c68985f4059220d7bdbb59e32a06dd2f441575993765a3f047a83ff4a24f0a66a5513506da3b8484b6627a49037239a149fa9769e9afaeb8291b6e25b1dc81d541b4572c9e968dc502e939d6a231769ccb3c1b01cda782d85a7fb02d23946d03287cd3390723bd8b7d811120ed218e2e6c44a20d5f3171b99d8891c7d9db009bc7a693b004dc665309cac4991e99c3c01db0843a04be986eca6c22a7d9f70138473276b6b6f32b5c5253aa06327fa963dbf9b6060794040a73c8f2cc66d4db6c17fc0a26f10839783f1982e7c322d0d3d7c3eac3f761afa046140cfaa965c9eb10d3b280ae65c34dbc357008bbf04e6975fd8a7cc1d14b46fbb8aa18b288d377bc34660d4075e2646c636366561883568bfcd6d7846a6e1f4bd88e106630796c25878984b9a3fd9f434c46cb537f3c22a8c395a8585f7dc7c67eaca080e7ed956d4116ed753a8829bec3afcd47f83f992aba3e210ac1dd6d9bbb26befe13d1a7a2bbbbfc8459a79f1d51a9b3568c463f51c480e8eb031d6159ea0df6d03be4ca9c1d03fae5667d541e7701589ca2dac81c4eaaca0573f64c6d735dc9a93ace303fe5c463d868e0821429ebdf3dedda31d909ad11650bf93c64cc438e08717f327b768ad710ac238e5bc78915f31a22206f9a99758abe3c895ef09fe15e7b5c0f74f19a6c3f3be17731cc38cc4d9b89ab7d03168bfe146c2175a97be81098b5b6b9c6bfc23f3c8cbf497799d942ba318133fcc929ee3b705d8bba241bbfdfaa639f2571e1cf406f91c6b5f7d7fca0819403fbd9f50eaac23c34ade58358bcc64e7331fb7e1461a02f1dc4dfef3ee1ee5391c6e071c45dec3321b2d0c48df0fd0522afaf43b42a999a29f59e50c5db4316bc1854f362284aee485c464c0360f2ec9187ca5b246f87d4c3d333116909dd2ec53386ecaa941fa66f8d9cb2341e771b7c737a49609239f935a64900fa20d69a6d5ae6910a5a413a01c5570e73aaf002aeac43b534229676be76ed30af97a0ec761d83ea088166c117ed8e62f0f3b6eac6034b9e52f0124553228abd7b213c7ac0f92b9e2ad7aaabe4547411c44ed3d0ddf3b9cc7f2a71be7420afad68bafc90af70ccc7574446ff873b43ffad1e27487d3e23ba3127b3af760da2e73e8fb3812789e869437fe0b6a6d3afa03cc68c9167b57b885ad1f77f72a4b5a074a7263b4bfeaebc5060a89be7c8dc91771159aa87f7d421e7a6c15896841827dc11468802f88733ae224ae473b80604813f48699e469d0d9760c88d3a8e2799cb3f829baf262f23baa1374d527073b4f9569e4a6fdb20fb2632bddd691f5be4aa74b7a1d5ba95840b3e00d5b45c644813ccc7785529576bebb1fa5e8cab79ad9bbae942c72f952eb85284ef61cc6dbd6c94623c097a18695086d6853818462b04cabcd23970cd5111483d7fb9b1eb34f749527b5f845c03070a59bfd5cf34b1fe9f80adda8b051fd77867d68bb7afb71fe7ec77073947dd747ad2a2c61150371ad03e96e317b3ad786db1129f15ef01639b9f2873c2f528a524f61282de9ffc3cc67209957e417a9dc7f26d28ed8dc639295de0010bc0eef8dc1ff11281a11f4ca8938ca75020c25c57044c13baa0d8068775e5ae73da57741eb411996a8f02a503d34b64773cabb85a9dfc3a1f128056928df6ccaaa544855a", 0x1000}, {&(0x7f0000002280)="315fb295e7a92f11504ce5591365df903a", 0x11}, {&(0x7f00000022c0)="a87ad95184fe49afa4d82aca52ac2a2457e28391aa1cba9335a042bad2f77c0e8ea67bc9918ab99e402648c394ddd6c749c227708f66c2fd6f2d4612d5cb7a497be53945b4ba2ee44a42732502b1e654cee3bfd64516675e48455b852cdea85cefa12e591d4039416eee254c78e85f4ebfd363958b23505fda3bea905473412ad0bb04992eb6069e8ab305352ad36a229f155f219f60200050d0db67f6f0644b10964ffd4f4bc0a40e85678dd79af58035ba0d50ced217323fdba72d56814f3d73f110caca0b52ea10067a5ab6a2df67ba099c6e", 0xd4}, {&(0x7f00000023c0)="d655d45be4480bccc931943a01e000967cb0d90fa1f0c086277ccdd9f5", 0x1d}], 0x6, 0x0, 0x0, 0x40010}, 0x1) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, &(0x7f00000024c0)={0x1, 0x1, 0x1, r1, 0x6}, 0xc) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000002500)={0x0, 0x8000000000000001, 0x9, 0x1}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000002900)={r2, 0x8, 0x925, 0x1}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r3, &(0x7f0000002dc0)={&(0x7f0000002d00)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000002d80)={&(0x7f0000002d40)={0x2c, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_ADDR(r4, &(0x7f0000002f00)={&(0x7f0000002e00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000002ec0)={&(0x7f0000002e40)={0x78, 0x0, 0x800, 0x70bd26, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x78}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEV(r5, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)={0x14, 0x0, 0x8, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000003080), r0) 10:28:57 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:28:57 executing program 2: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f0000001b80)=""/65, 0x41}, {&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/3, 0x3}], 0x8, 0x0) 10:28:57 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$xdp(r0, 0x0, 0x200000000000000) 10:28:58 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0xa0502, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000040)={0x0, 0x0, "c05bd7d14e9c0baa33bac6b9586ce2f8dd4384f162c04567d68432aedf100bcb5ae51393c464bca9169b4e2896e5023dbbb8957635302a0c0b7316ca48db80cb271e63323cd5a4882f342424376d56dbce320509ec5bc7f22aba17fa10cebe3e00e466b8be6a5794815befd4b173c5a3d2a65455e396fb7642d7b3f11365b9405ba0ac2c90c891ba72a6d985827ddacf6832803e1b421d665415bb6fd90100018712df8479f213c5c58ec9e66fa2b4adb94f50ecc2ca6896596be7ad3ecadb8012a84b7d9ee81ca161c56acb01c7a01c2321870b5118dac52c1a20cea421dff23456ff95368d7bb349834490c8f3700eee83f873a1bec52c0d1a2572ed974369", "3ba2be79822557aee8d71900e4372883e868cdcb7694ff63aff57bbe3f28d1fd2a67fbe4d9f741d2d1933304a473bb816d13358018a5c0e05e4804d1c0336c09f6e0ee38777137b98683411d869dac95f9cb0c9388b2584038c77bc08619892a6fc68fc58936ca085caedbd61b7e938c2f05bfd581ba2a962b54c722d491161de7e5878f48912766bc1a34205332e24e607c5ba48dd97da482beb5364a3a47fbd100e088fdb45150eeb3757385e09cc693440d3dafd881fb5d4be06dd2a29055e23e714b712aa61ff9d3afbfa4ccf8a88f8f1a7a2a7a4e9fe8161ba6fa56e504c7173497e70b8f6af653ecbb1fde7f415a150fd71bcae4cb10f4d0e23e82b1200acdb45a5b6d085366b668a3e9dedc228215ec2deefc5a259a17054b5e3c28dd5a933b54ae249494d4e2e71e7acd4664c3fe68f2f42edacb92c79589d890fdfc49ec887e4035b9705547b7ccadcecb79e050fb54710a1ad9df7d75e2dee2757ee496d6b6c642791299a4a9739ec99d7a8c2f0cf69c0d6979e76cbaa6310191275094c268ec1d08522d115704dd8d278d52170f949abba7f2af979aff487296148a3520e4d4c2fea2dbef1591047d4051e72cc8d3b3b8cb4c60bc72b4746a475585fd9ba2bf0ac756acd111834078f6e5387939e78d48de97335f8cef1b457824395720d5edd153d42165f1ea0e2dd7241f09359aecfcc6ff44f753ed4232be03bb4d29d59daa93cb3ab3a97d9c8dd29de2d4364ab3c755b6923191e8b6922a59c06b328d8fb467262661b7226f7fc3332f736e0080c9456339f5c1da53d0cddb9b51791c3c78736a938538a3785c89719e07b2b58c5a5b2c5eed8a21b04df1071b9eca7e7ac9b903b0f87d591906665ee6b1614c4bc6a528071462e99c70c7c7e18714e5eddedf3a0d1b705e1aec82ff3a8614da0eacfe679b31e218374a961d6d414f8706d2752d76f1b5219df50790e097c9a8962d03366a56b09baa8ea7b01876f251097dc027fa3b938d3208f7765b44d31d5ce9a1f2ab73f3e5155696ddcac0088278b5af9ab26780df22fd93d9a094fcaeaf6a75d693d69b3b255628a8250092334e3e4db5b3b96bd9cedff85147c88bd8ad1ea5f1171b217b1f2ce3b5dc5420a77559e64f8941f136b4ae3abae8dbe55c07de534f3c4207b27854848b4b630a550c10333bb625b0e1b8d21228f1ab2994e62143835f64677625297c933e52610e2394aec2e2c69073008c6f731d07ccb97ad4ee531bb544dc9642e4c0f121051071e05a790bef33dcb7e2d48bc54a7a0913c8a97102a2a449ee17e9ccecc3055410c71d53ae53fe90e603c4776e6895c19121ab54abebd393031373eb27b64e8feb0f3f9cda14c94e65470933df246d8f5e72f6a794b4e2c48ec42f470a1dadbf3a653cce040278d1733ce3e8f5da55a23d20a75e324c67c951b9121e0fc178d170ad0d51c6a8689fb866a80fd5edd345eb1a8aad71256ee04315357d4fe36b4ae2757451c2289e61f416121c2e163badef53f119af16310c7b2dd2731109b0d22e5bb274b42d2c16df5079a39580fef752d30f77330912f31376d6cd751a81c63e7aec7d3708e10404f8c75f68749d15d5794a41f374ae46062ae530df4f955b6de1fb15b4d3d8b35c5a751433602286dab643946ecdc986ad85be70dd3e66b68187333df63a461da5788887d49e7991af6bf47b413975aeddd80adf1639e6108b4a245c4d2945ed996971599d89039955903847b13cfd65be2c0feabbf40a5a6d3ead04c30412fcb011c46ace1ff8bb6b39cdd700e61baf1b0a5a502945615b75b34e1d4fe76d05be594af3b5d86a0ffe74e377a77643122e5f16c186c83fddc3ab4284e904b2a0e83a8b90c22200c733846720c5b50eb4b78af4dddd3698b4639eeea3812ff5540a0f0673080eb75f3da431464b4f68526d08f99ea427b34c359f88c3319fe2e1d30cc81e9600f22fe5e36b049858840130e8ada3b3881b126ebbc8d483e5aa63f540e4ce0cc5ac9c3ac0303757bc855108e0e5c1783eb52f960df2f9b91fae8258bfadaf1c06d34dd8c40a92a15eb16c47220cc7d936ac9d265e2dd641d1ac753b4d4c27e7e2f261e4799d3f129105dc2f7e2a637ba3997579b0094336e419b54893b7d43535fd1e2317b0afa6684d011499ddb02ed3730883888c7b2afe7702b2df81c9b9bf06f37c2008fa09227a7118314571aa0368551f3e10be8c71c5a9593793f5e6f3579e50ba53d639ccc84165188296ae6fe13b2d6f526b233d8681f19b73e9b732d9d5d40afd20f0e8f8470e1d2e153580e0270d4bf5f7eeb3ef20b81618cf8c786c9f67bf4df9e89f7f26f6088a1701014ad5a45a352d2c37b979174305dcb9ef350b6660d577eab5f22691c7b4f6d7bd98daf8ec35e56584d365a181847a4176350802a6852603cc12c2f82f8c23ca9ecd12c7c542429b8362b6650f81743b774b8216709f214af018b2a0207d2b777c3e5f42e08f5213ea446136a5925dc39e29732cbd447811006ac63a060495139cec7fa55654a7e9ed85f37a9d20b24ea76523737704ceb4a0ad54dabdbf9703a0cf913da17c55234f1014db898be3faad9dbde65885c2fb89d783d569224eeaf04ec5dcfdbe16db4cc87952298251b5a62b4d74fa4752523eeda28b4cec9d2e198e4e8823284c075eedb7a15811e3eea090de9bf1c29d6e32c61d80cfd79e97cb552f4aa94437fe9b40686182994c3902c87e590c7afbe33bec71040b20e21252a498aa540356a7e009fd36973bbc058f1dd57e29338134cdd7416d9a2028a1f5c36aa88b69b7c5e5ade6cfc14e2223bccdb3f632c9db9a2084939e13b235fc5789ba3ede452306f5530df385ef8af0231978207317e60e983b4d421b660a9c79cebf811eb6fe98bf82c385e7b5209ce7e9c443b0e9f6059a59cd158664fae8fb448b81a14e459f6115e8a126e5a779f502b40bdbe18ee7292b409305ed07869423176ef09cbca6143f1f178d3d5783e70e71dc8cad647f294edd1230d9b12529afafd601757251c941a0820d16a65d350c0b6f901d316f82cf05e8e7c9bbe756f6af1cacaf4e0e33db205413c5bd92ef69a6e99e807d03c6dca580e31948bc1b3df5eeac789d396abcde0d77f5d714ec2779a3a774f43fa028171a64ad703de5b72a207321213423ee9057866aaca10e942a2af5845156440ca3ee59d850246e92720d2c60f613549a9cd6a3ef6c253263ef1a13562fd8f81be4d5a87cc74788fd116555587c6be2fedccec696a881d182d0660644b9caab827bf2120b80be69f9b08a86f284796850bedc97faa071347d5afc21c29835b814b6091f525c23b85545949b2df4782c8b61e52563b0a6af074fd4b368adbc10db79251b2251f37066b4c831339652041cc87b33e228588a4c2326dacf2a12fe1e1c5e42a419472dc749acece641807f97ab8f74cac3688414dc07a26eabd8e5b7b1897661afade0b546a4a7b55bcacc402ecf0335ceeee868b2f036fecbdc260c482af91524f0a23ab09ccbf47c522c57c9702c479c11cdc4521be3109054fb416e5f2e250177f73edfd36e2d82ed97ad6d2587a61252ecedeb7e88274331ffc69ea8f78501bfc9cb0d441e69fe10e2f5517c10648156645e7c3b98d68d4a42236c77eeef379e443b2a5ccfbe0a9f7791513c41352e3c8c1cf0e353618ca5fefcefd18fcdf7f8fbeebb394144c98e89c5083bf8a9427f3d3075b8ac823c8db379cd7d4c30ff2a746f896e8bb1006c3fd46161db3cbe38dc35aa64b1283931abd2324fdf2eca249d15cec4741f6f8c28e7bf4343e91e0f49e2d3258e7bcd6aabbf2ab17d7b50578c9c83cca35e14bf1804ce3fc7cee597bc5291d2510c348518a9535fa9b45af89e973eb365a850951ec78f5541a0725afdadaa41bafd63ff213240b039e72ff2077ce1ffcb321fc32f1b958224ebb7f1e09d287e54ec3049c93d2d513fd0632d90e2db98f62661adeeddd3169ecf9aede6426fb5b812a99e38fa10b62a81a1670d8f7fef5dba0bb139d27af2e19a9046336e6620e021144fac1b7faa1591599dcffe2a1c434975e13f9bd393c1fcf2295beb08ce90711dc1a96d9ab0b7bff0cb7d4f96ca1129ed1e8c90479313f4b1d0ac45d590b3457cabefbac6736c5bfa28328dbf315636a2a2826aaec94980a0fea1f811f0870d5527a1def0df95a00cd6658e776e5283f3f9f50da550142e22005fdb703635501b259b912ae96218c155fe711ac306e85f39a2e1248641d10de445c1be188390bb4fb33a25d1fa5be79f21465a9628fb7ee396cdc2b57bfd50b306e384846e760b047ae1a40ce3d49998a62641d033b0b7fc8af80c30860dbf4c9543d21297c20387ba3608cd2bc2bf3d2897df3aa93564d6f6026a3cfec6926f2c60aa6200ed0e06f2a832a817e31287841242d54d630eabfc1941075127e3468abb7cb344867b74a7dd43ca18c2bbbcf5692f27388e81ffb7fbeaaa143916552af98a2ea09f743041f80836824b93f50cd7a1a54ebde5f43c40f707a99b98864522701392e3dba09f723c3d9741789bed5d325335509bdeeca91ae988d8204907da4623f08f11a773c28af2811458966fe84afbe835bd5af9fcf3062520519e8ba8d5cbeb401a0a0bd43004b50cf5abfa14863338f21ce436737d69ba186a3082f56ce911f5652aa3c17e3f31cb55dc5089b027e28336230948206bdac86b56ea38f992dc6735cfa6dd57b5e5e0065de3d4f638bae757214f498c4a6d9e1dbdead3d999380d34860937b2a4232db999eb0e5f76951fb13e21872a5794cfd4f224ac9096c17dadd8e8296b80d7b5547429665373d9a53469527af4e199b3b0a2ff641fe83ae22dbafac7b2152bb6a123e4a9e9e8e8ac50ad03bceae9d11291c66372f782c6620c910fbceb0c9902386785703fb45d08c41a3c7205fd3a8a6bd486f52cc3c55212454c8759d2a979a49d989ea5584ddead9d38ba569ee632e505dc4579fd4164e1ac15c0705f612049842b4ad92c018de29c75b99e7a84550b97a30c040d408d19bec227521209c6efcfbef963be6c05ef5b374811936e53ccb5b8c0c0e578fea8d1b5343282849b1e69c704fb007b3ba1d7b0cb639987f3c54b1ea1ed7ac976360b5b741a86a5543e3e0345690194b6f0cb54cbec2ea173e1c07d6f92ceeda0242b1fc6930d2b2e677a19667cc446797a37d1f55af18e9601eab7fb78ea35dc2dee9f5b4820a459f0d93ade9ec81d9eb824bc6404b0dbbd25ce848f0ce9d5f7b24255356402cde39a16d8a54845e6d50e09ab51c43d337d48c3220223833bd87c6cf87f3d1ec0f546603eb61d65514752c94137316e0bbfcece9723cd46f7c10eef9540f1d9e97a28f2dc7deac7bb26581eed0cc819fbfaa7"}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000010c0)={'gretap0\x00', &(0x7f0000001040)={'sit0\x00', 0x0, 0x20, 0x700, 0x2, 0x401, {{0x14, 0x4, 0x2, 0x0, 0x50, 0x67, 0x0, 0x3, 0x4, 0x0, @empty, @loopback, {[@lsrr={0x83, 0x1b, 0xb, [@multicast2, @multicast1, @multicast2, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x32}]}, @generic={0x94, 0xd, "8cd20b1efaf750314a2d97"}, @generic={0x89, 0x11, "6dd6968451b313f9592c7b48211429"}]}}}}}) sendmsg$xdp(r0, &(0x7f0000002480)={&(0x7f0000001100)={0x2c, 0x9, r1, 0x37}, 0x10, &(0x7f0000002400)=[{&(0x7f0000001140)="3c09c293aef73216d19bf288f1712a7575fd286f41cfe7ed61d7d1719746c45d9e57477f014d91f34c5d25ade3b377800bb6f2486e11ab802ac2ec7b408c65d400b12ac8b767dad819611c34612cffe650bb74d5f86af413b032bf26d178ee2099258c7022b88dc1af", 0x69}, {&(0x7f00000011c0)="c8a9954f5e6a32fb1be61d746021c58dccc68117fffd0cfce36d633e089c77ed5a66f4ecc9d2752332bc664a5b546eb01442cc64b215b286a41d93d1ebe79b8ddf43b9972e9b81e65517dc9e667971c6ac08f10a121074f9f57962a6c2b509f5004c56af137495cd53f9ec78c2323397e01287ac28fda9079859f051b14b0afd001a2016150c8dc61d798d489daa9c", 0x8f}, {&(0x7f0000001280)="816fb2f3422eb2559a5e8eb728391cef25402d82823dcb7fed8d076032f373a86da35fabda565de12b2f0d0630c14bd1256325bbf6ffa4beb196a3271b4b7b6742836ae1ada48ac4471083f7a686911932ad19e68739d163b89e154dde64f8842e226a8b93f141f1ea3132702706860f2e0b86eb6cde3a63efbf2fbb79245d5fcd6295562b40ebb1260e4d4a9cee7fa9446cdebb23651ad07a2b5803961e7b01025258d9afa4a5416f5e80165260a809182c9e10f21e8d0bfba4add612ab858a49d6eb7c192f4973da17310d405c024a0aaeb22d46cc9cc4229dfe668b439f12e92796540adc79ffdabc9167afd15741b75cd195e404741631ce26505b8fbe348a4f920c076d59aa4c996697a1ecef9f0119e50316065c2695cbcb644ead8bd0031e9959fecb5ee0a998cddaf526d83257a2d63139d8d2950dd0e5ccc8479df7e59d3afb0e1bc1002dbbbe80bc725d584c48247468e3785544d30a55997c4554836eb7dc7a363104798a3a07d5d0d622faa42093fbd5c128de4c0803e2bf4c4a6dcc62cd6a6e2bcc573b1d55685cd7d5dfd918889e9952963151d13ac5dc7be47d451e0983dbccf5a9938d7438f84b7be8530ecdaea80f9a551f90403c24d8962ab2522a8114d71bccaa5d0266da551adaa7401e78351566e83a39f79b0d2284610aabbf2a293aff032a397553e5a994feb2f90c783c99e04a35110018c41324a56972841c882208e81db6c1de3ad378cbb9eb13f25c853648b213d85e4df4e1a9142959fd0c7fbfcd5881d55a4ef9e17f17932f2751c54b586bca0071d6385fdf7fa08039d131c3e7bf1befcac962be0efaaac7c12c954e48cb655a3f1147dec8fe3b67a21a3812b3d28b328eb66c6a94b0f1391945b61e9181ea6cfb497944c55a50fae959b7ec57ec5339c52d9072ae928859cd0e2cdd62fb6339a0e3c419594abac52c295e99a7b44977c056f5ad91962ba542543f8594bee06cd9307d7a9e52dfa1bff099facc8790b746c33406a2b09dbe09bb78c6dbfc66d626c439227c6ffd6c5e64e63c753684d5e51ab667f040c5cf2445fab52b5b2ed094cfe7ace6578ca9b01e7d083eca4b6460c1cd2c50437a64a3a9941dac95f3c96d63c51d4fb73605433bd05f4d7ac054346098ff905c41702699d0a25ccbbf0c18fa60e309166c9d0ca0509f08ead379d1c917efbbb1158484ade863920d0f767f88fdec0da006b1351bd7e2e7af6307462fb048f8ad01526dff41cede7f37dadf19876f892e0aef0578255fb65f5bdf92d37cd0e79c8b89d2bbeec4bc3cb91c816225760fe88e96748e0e5a98207c1fabfe3c10627ebe22a8a57ea26db10ae3f406ab781c4872a5db7359b810cfc6b63daf52771ebee6da7780187847d58a7277930ea1d2057d082c3587d002f852ce33fe9919fb95f89c05b1fa178d46704ab161ff33ac0e4949abf13ba348b9d066c8e04acffff4243b52c0b9d328ce0a88883958f7dea26efb797ac560c70a975aa3c27d9fc590d5ae3a58a2b89a86715b6157e4f9093b1c6c996099d4cc964112f1c28e5f950222e5daa5809ad519ebeb3ee5edbc592d35310ca7b6d08049ceedb15301c9a5f9b4f90dbb512094fa88c1553b115a5d2107ff5fedbe0e265f549229d9fb06861c5e3140cac37eca805fcdb5cb335b4f871cc55b037fd583d82c84e5e3203370b9b04fc30adc5725fe7abb31f3dd040e9de5613ce1b83174f8e39899607140290d828ceb9192eb3afb3cc2ffb6f418d16fb8cf342e6c70659a0e50a00805bc345b5e4a175913eacb6531f2b2f818f264b65b25c5634aa2ccd7be31a0a70f90cad8b48c9eea77cf622926a996465ae822df96e42bebba855ab886514bbd3ffaa77c6177b7f241a05d2de0be1edde5fa0fc3fc3412219517ef1f5c577517bed43acf0b41b19315c52ffa67d6e1d96f74b622acd30358aebe65217e4cac0b123e00d392d9dba0c4626674123b5176715080dcfef835dd1b9f9a554ebd21ed3aa1b79e912d98308f1bd9e56b6d8c89bc041cf2ba6ad2916acb689dfa3197cdbbef0c650ca172436611e3924fac0ce2d02ed4766ae66a9aecc4078806c1ebe23cd5b210f052607daf96b1acd3c3b120d0fa6e34fd880411f1484a96dbcf967b86dbb45df98a8b22f229ad1fb690b2c57e15a4c2f1d3d826b3ac0a4785ddf0ee087a7022d804ca4306b753d7bab3374c202bd93c7d9000f7a3889f29df6359e9bd79a608ba0e644464015ae52bfde55a5e12ff25848ead3fc34499affc14bcb7f7e190075f02e50d39225e5f690db8754b6be38418b632ec375e7e006130b62ca86f69db5dfe93bd2bd68d6fa906850403f1e16ece0c54a0018b6cfdceb5fece1636e0558b3950d796b6250bb0b01406e744ddd30a2b8e32045bb21bf85d301ae952073fd7940f532c3fe5548938178489141c429618482914e75ab18001ff0dab7628897077a1bcba81bf904a5bfcfc3c99f7b90f4f401e8cd6f5053efc9cac275617cd663d53c88fbbc9aa63919ac9d7d663d122548e0bf87602daa39b73d3f9eece5511b5ddb57ed8aa8403b7d0cdf31717558315e582757bb0376f5413a88c4a395cc9692292e2dd83dbebdf194e028ee85fd8ee3cd1b4c99c6935cb05ea16926d5e709ce7c0298eaacba2ae0cd4aa5b97eb2c24662faf05fa1c910ab5c70615439810b6a1aabc9987a5a9f8761015cb4e00bf89ea4e42858e13c1f5c4c5feab6d43e686fe96415fb94dbcec93e3c925f9dc899d5ae5ee86d5816326c8d3da2114e914bcbfa4f7345619f1da369f8f9f74b313dbecbd12916063a0354429c38ae7af1b71b90c8b7a5b6cedd178715e2b522681a555bc5b54d60e4d6b48379ef43788e7a87fcf3a66bc6173ca8658b14449d13738cfbe93f859c4dbfa5e56b8e33b6f729597f41cdb095186b07e4302cd65383b7c4fca798561b046ee990ca3a52807a8e4939519262783fa2175e3a2fb7e36e5cd7a13db2c735eab815aa029b6ece1e964102ffa62e953f9e8918300bb545f3149c29a6c33d62fa8939d154f1b7e70eff7686ce703ddb4d0c856d5f3df52c12811ae44325bc2670803e1338abcd3080e24cd4f4f9d6bba11a64f22d7fed0f2d193c5c1dada0eb56279a48ac5592c59de6fab93084de63f8f1b9b133fbea62ca047a8f6037634b849a707df0ef87ad2b2a79818939f000a6a2539471ba5f9b6bb7012bb98f8782922eba08ea73e81dd60d27cec73816086be6271307b7bc742b476db832bec81b4bfa4e46faab8842065478bfbfd794ce2fdf37fe86ad525d188bbbeacdb778d895386bd29b92a57d5b0dd380a4b3816ab0c42ebd6a59a5f3856e8021f6b0f2c668096ce9c3abac8e47438950acfa4d6d7ef454b32768c880e36786f09a6fc3c8cef6cbc8a72ce1066140ffe407317b8d9e67961912c66710286d57adee8983a4c09e370e31f2d3c1c2b4ba39021b537ae462251e4c2731bacf74bf58119ec06a086169166b5455d408eb954ef5084a5b1646e4e4fe55c44597d449e5b99026a774a44e3a1298256b7e341f164908a1bdeb0bfb81caa5cf8395b9df5db9d22b3c1002eea38f288e8df3dba06541b52463416b5cf69b3a11b0b7bbab86b724902c4ad86364c528f64dcfe731bd2b78206728ff643730e1f6c97fc52049d8c5edcec17411d43725285414342c84a2637e37a5bcbf71c550b51d87b069a935f21466317557989cadd2347e0d6b83d852870a03006ef7fe1838bff1d44f629032868b2d24d9b0415b2fbfaa3ce6d8ce5af4ec33c6db0be58d8074be364d978c6d5c8fec880860436556e1ae6196a93040f1b356d7ec713de9e6421e9a55e7ebd9514e230a1c27a9aae540511087af0e4023f0088179a91210aa48e8a5153c12226b44e4402839d6a64cd3450e6b1865e76b73a3fa11ad7817c437fc8918523c052f224e192f343d87e65075d28ec457808ddc4675050c237c37bba73027ce12e2907a8aebb4094c3e0fafa7a264ec0b8598992e04899750bf8bc0523a76a1e49eb3a501a96d5516c89f11e3f946a983d8c694612518938e96b0940b156fd60429e610665fc599f5ad7e8b1aaf7f30d15bfa805c68985f4059220d7bdbb59e32a06dd2f441575993765a3f047a83ff4a24f0a66a5513506da3b8484b6627a49037239a149fa9769e9afaeb8291b6e25b1dc81d541b4572c9e968dc502e939d6a231769ccb3c1b01cda782d85a7fb02d23946d03287cd3390723bd8b7d811120ed218e2e6c44a20d5f3171b99d8891c7d9db009bc7a693b004dc665309cac4991e99c3c01db0843a04be986eca6c22a7d9f70138473276b6b6f32b5c5253aa06327fa963dbf9b6060794040a73c8f2cc66d4db6c17fc0a26f10839783f1982e7c322d0d3d7c3eac3f761afa046140cfaa965c9eb10d3b280ae65c34dbc357008bbf04e6975fd8a7cc1d14b46fbb8aa18b288d377bc34660d4075e2646c636366561883568bfcd6d7846a6e1f4bd88e106630796c25878984b9a3fd9f434c46cb537f3c22a8c395a8585f7dc7c67eaca080e7ed956d4116ed753a8829bec3afcd47f83f992aba3e210ac1dd6d9bbb26befe13d1a7a2bbbbfc8459a79f1d51a9b3568c463f51c480e8eb031d6159ea0df6d03be4ca9c1d03fae5667d541e7701589ca2dac81c4eaaca0573f64c6d735dc9a93ace303fe5c463d868e0821429ebdf3dedda31d909ad11650bf93c64cc438e08717f327b768ad710ac238e5bc78915f31a22206f9a99758abe3c895ef09fe15e7b5c0f74f19a6c3f3be17731cc38cc4d9b89ab7d03168bfe146c2175a97be81098b5b6b9c6bfc23f3c8cbf497799d942ba318133fcc929ee3b705d8bba241bbfdfaa639f2571e1cf406f91c6b5f7d7fca0819403fbd9f50eaac23c34ade58358bcc64e7331fb7e1461a02f1dc4dfef3ee1ee5391c6e071c45dec3321b2d0c48df0fd0522afaf43b42a999a29f59e50c5db4316bc1854f362284aee485c464c0360f2ec9187ca5b246f87d4c3d333116909dd2ec53386ecaa941fa66f8d9cb2341e771b7c737a49609239f935a64900fa20d69a6d5ae6910a5a413a01c5570e73aaf002aeac43b534229676be76ed30af97a0ec761d83ea088166c117ed8e62f0f3b6eac6034b9e52f0124553228abd7b213c7ac0f92b9e2ad7aaabe4547411c44ed3d0ddf3b9cc7f2a71be7420afad68bafc90af70ccc7574446ff873b43ffad1e27487d3e23ba3127b3af760da2e73e8fb3812789e869437fe0b6a6d3afa03cc68c9167b57b885ad1f77f72a4b5a074a7263b4bfeaebc5060a89be7c8dc91771159aa87f7d421e7a6c15896841827dc11468802f88733ae224ae473b80604813f48699e469d0d9760c88d3a8e2799cb3f829baf262f23baa1374d527073b4f9569e4a6fdb20fb2632bddd691f5be4aa74b7a1d5ba95840b3e00d5b45c644813ccc7785529576bebb1fa5e8cab79ad9bbae942c72f952eb85284ef61cc6dbd6c94623c097a18695086d6853818462b04cabcd23970cd5111483d7fb9b1eb34f749527b5f845c03070a59bfd5cf34b1fe9f80adda8b051fd77867d68bb7afb71fe7ec77073947dd747ad2a2c61150371ad03e96e317b3ad786db1129f15ef01639b9f2873c2f528a524f61282de9ffc3cc67209957e417a9dc7f26d28ed8dc639295de0010bc0eef8dc1ff11281a11f4ca8938ca75020c25c57044c13baa0d8068775e5ae73da57741eb411996a8f02a503d34b64773cabb85a9dfc3a1f128056928df6ccaaa544855a", 0x1000}, {&(0x7f0000002280)="315fb295e7a92f11504ce5591365df903a", 0x11}, {&(0x7f00000022c0)="a87ad95184fe49afa4d82aca52ac2a2457e28391aa1cba9335a042bad2f77c0e8ea67bc9918ab99e402648c394ddd6c749c227708f66c2fd6f2d4612d5cb7a497be53945b4ba2ee44a42732502b1e654cee3bfd64516675e48455b852cdea85cefa12e591d4039416eee254c78e85f4ebfd363958b23505fda3bea905473412ad0bb04992eb6069e8ab305352ad36a229f155f219f60200050d0db67f6f0644b10964ffd4f4bc0a40e85678dd79af58035ba0d50ced217323fdba72d56814f3d73f110caca0b52ea10067a5ab6a2df67ba099c6e", 0xd4}, {&(0x7f00000023c0)="d655d45be4480bccc931943a01e000967cb0d90fa1f0c086277ccdd9f5", 0x1d}], 0x6, 0x0, 0x0, 0x40010}, 0x1) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, &(0x7f00000024c0)={0x1, 0x1, 0x1, r1, 0x6}, 0xc) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000002500)={0x0, 0x8000000000000001, 0x9, 0x1}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000002900)={r2, 0x8, 0x925, 0x1}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r3, &(0x7f0000002dc0)={&(0x7f0000002d00)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000002d80)={&(0x7f0000002d40)={0x2c, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_ADDR(r4, &(0x7f0000002f00)={&(0x7f0000002e00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000002ec0)={&(0x7f0000002e40)={0x78, 0x0, 0x800, 0x70bd26, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x78}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEV(r5, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)={0x14, 0x0, 0x8, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000003080), r0) 10:28:58 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:28:58 executing program 2: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:28:58 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}, {&(0x7f00000018c0)=""/169, 0xa9}], 0x2, 0x0) 10:28:58 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0xa0502, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000040)={0x0, 0x0, "c05bd7d14e9c0baa33bac6b9586ce2f8dd4384f162c04567d68432aedf100bcb5ae51393c464bca9169b4e2896e5023dbbb8957635302a0c0b7316ca48db80cb271e63323cd5a4882f342424376d56dbce320509ec5bc7f22aba17fa10cebe3e00e466b8be6a5794815befd4b173c5a3d2a65455e396fb7642d7b3f11365b9405ba0ac2c90c891ba72a6d985827ddacf6832803e1b421d665415bb6fd90100018712df8479f213c5c58ec9e66fa2b4adb94f50ecc2ca6896596be7ad3ecadb8012a84b7d9ee81ca161c56acb01c7a01c2321870b5118dac52c1a20cea421dff23456ff95368d7bb349834490c8f3700eee83f873a1bec52c0d1a2572ed974369", "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"}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000010c0)={'gretap0\x00', &(0x7f0000001040)={'sit0\x00', 0x0, 0x20, 0x700, 0x2, 0x401, {{0x14, 0x4, 0x2, 0x0, 0x50, 0x67, 0x0, 0x3, 0x4, 0x0, @empty, @loopback, {[@lsrr={0x83, 0x1b, 0xb, [@multicast2, @multicast1, @multicast2, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x32}]}, @generic={0x94, 0xd, "8cd20b1efaf750314a2d97"}, @generic={0x89, 0x11, "6dd6968451b313f9592c7b48211429"}]}}}}}) sendmsg$xdp(r0, &(0x7f0000002480)={&(0x7f0000001100)={0x2c, 0x9, r1, 0x37}, 0x10, &(0x7f0000002400)=[{&(0x7f0000001140)="3c09c293aef73216d19bf288f1712a7575fd286f41cfe7ed61d7d1719746c45d9e57477f014d91f34c5d25ade3b377800bb6f2486e11ab802ac2ec7b408c65d400b12ac8b767dad819611c34612cffe650bb74d5f86af413b032bf26d178ee2099258c7022b88dc1af", 0x69}, {&(0x7f00000011c0)="c8a9954f5e6a32fb1be61d746021c58dccc68117fffd0cfce36d633e089c77ed5a66f4ecc9d2752332bc664a5b546eb01442cc64b215b286a41d93d1ebe79b8ddf43b9972e9b81e65517dc9e667971c6ac08f10a121074f9f57962a6c2b509f5004c56af137495cd53f9ec78c2323397e01287ac28fda9079859f051b14b0afd001a2016150c8dc61d798d489daa9c", 0x8f}, {&(0x7f0000001280)="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", 0x1000}, {&(0x7f0000002280)="315fb295e7a92f11504ce5591365df903a", 0x11}, {&(0x7f00000022c0)="a87ad95184fe49afa4d82aca52ac2a2457e28391aa1cba9335a042bad2f77c0e8ea67bc9918ab99e402648c394ddd6c749c227708f66c2fd6f2d4612d5cb7a497be53945b4ba2ee44a42732502b1e654cee3bfd64516675e48455b852cdea85cefa12e591d4039416eee254c78e85f4ebfd363958b23505fda3bea905473412ad0bb04992eb6069e8ab305352ad36a229f155f219f60200050d0db67f6f0644b10964ffd4f4bc0a40e85678dd79af58035ba0d50ced217323fdba72d56814f3d73f110caca0b52ea10067a5ab6a2df67ba099c6e", 0xd4}, {&(0x7f00000023c0)="d655d45be4480bccc931943a01e000967cb0d90fa1f0c086277ccdd9f5", 0x1d}], 0x6, 0x0, 0x0, 0x40010}, 0x1) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, &(0x7f00000024c0)={0x1, 0x1, 0x1, r1, 0x6}, 0xc) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000002500)={0x0, 0x8000000000000001, 0x9, 0x1}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000002900)={r2, 0x8, 0x925, 0x1}) socket$nl_generic(0x10, 0x3, 0x10) 10:28:58 executing program 1: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000740)=""/4096, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:58 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:28:58 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$xdp(r0, 0x0, 0x2000000) 10:28:58 executing program 4: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{0x0}, {&(0x7f00000018c0)=""/169, 0xa9}], 0x2, 0x0) 10:28:58 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 1) 10:28:58 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000001c0)={0x0, 0x3, 0x80000001}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000640), r0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000740)={'syztnl1\x00', &(0x7f0000000680)={'gretap0\x00', 0x0, 0x7, 0x80, 0x800, 0x7fff, {{0x20, 0x4, 0x0, 0x24, 0x80, 0x66, 0x0, 0x5d, 0x0, 0x0, @rand_addr=0x64010102, @private=0xa010102, {[@timestamp_prespec={0x44, 0x14, 0x7a, 0x3, 0x9, [{@loopback, 0x10001}, {@local, 0x7fff}]}, @timestamp_prespec={0x44, 0x2c, 0xcb, 0x3, 0x7, [{@private=0xa010100}, {@empty, 0x8}, {@broadcast, 0x2380000}, {@dev={0xac, 0x14, 0x14, 0x16}, 0x1}, {@dev={0xac, 0x14, 0x14, 0x1b}, 0x3}]}, @timestamp_addr={0x44, 0x2c, 0x51, 0x1, 0x5, [{@rand_addr=0x64010101, 0x2}, {@local, 0x1}, {@dev={0xac, 0x14, 0x14, 0x3d}}, {@remote, 0x6}, {@private=0xa010101, 0x1}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000800)={'syztnl1\x00', &(0x7f0000000780)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x80, 0x6, 0x14, @local, @private2, 0x20, 0x10, 0x0, 0xfe54}}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r2, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000840)={0xa0, r3, 0x300, 0x70bd25, 0x25dfdbfd, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xa0}}, 0x80) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x80000001}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c081}, 0x80) recvfrom$packet(r0, &(0x7f0000000140)=""/3, 0x3, 0x40000000, &(0x7f0000000180)={0x11, 0x1c, 0x0, 0x1, 0x80, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) 10:28:58 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 1) 10:28:58 executing program 1: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:58 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:28:58 executing program 4: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{0x0}, {&(0x7f00000018c0)=""/169, 0xa9}], 0x2, 0x0) 10:28:58 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000001c0)={0x0, 0x3, 0x80000001}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000640), r0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000740)={'syztnl1\x00', &(0x7f0000000680)={'gretap0\x00', 0x0, 0x7, 0x80, 0x800, 0x7fff, {{0x20, 0x4, 0x0, 0x24, 0x80, 0x66, 0x0, 0x5d, 0x0, 0x0, @rand_addr=0x64010102, @private=0xa010102, {[@timestamp_prespec={0x44, 0x14, 0x7a, 0x3, 0x9, [{@loopback, 0x10001}, {@local, 0x7fff}]}, @timestamp_prespec={0x44, 0x2c, 0xcb, 0x3, 0x7, [{@private=0xa010100}, {@empty, 0x8}, {@broadcast, 0x2380000}, {@dev={0xac, 0x14, 0x14, 0x16}, 0x1}, {@dev={0xac, 0x14, 0x14, 0x1b}, 0x3}]}, @timestamp_addr={0x44, 0x2c, 0x51, 0x1, 0x5, [{@rand_addr=0x64010101, 0x2}, {@local, 0x1}, {@dev={0xac, 0x14, 0x14, 0x3d}}, {@remote, 0x6}, {@private=0xa010101, 0x1}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000800)={'syztnl1\x00', &(0x7f0000000780)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x80, 0x6, 0x14, @local, @private2, 0x20, 0x10, 0x0, 0xfe54}}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r2, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000840)={0xa0, r3, 0x300, 0x70bd25, 0x25dfdbfd, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xa0}}, 0x80) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x80000001}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c081}, 0x80) recvfrom$packet(r0, &(0x7f0000000140)=""/3, 0x3, 0x40000000, &(0x7f0000000180)={0x11, 0x1c, 0x0, 0x1, 0x80, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) [ 139.572823][T27681] FAULT_INJECTION: forcing a failure. [ 139.572823][T27681] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 139.590256][T27681] CPU: 1 PID: 27681 Comm: syz-executor.5 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 139.600523][T27681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 139.609055][T27691] FAULT_INJECTION: forcing a failure. 10:28:58 executing program 4: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{0x0}, {&(0x7f00000018c0)=""/169, 0xa9}], 0x2, 0x0) 10:28:58 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{0x0}, {&(0x7f00000018c0)=""/169, 0xa9}], 0x2, 0x0) 10:28:58 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{0x0}, {&(0x7f00000018c0)=""/169, 0xa9}], 0x2, 0x0) [ 139.609055][T27691] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 139.610414][T27681] Call Trace: [ 139.610422][T27681] [ 139.610430][T27681] dump_stack_lvl+0x151/0x1b7 [ 139.633677][T27681] ? io_uring_drop_tctx_refs+0x190/0x190 [ 139.639151][T27681] ? kstrtouint_from_user+0x20a/0x2a0 [ 139.644350][T27681] dump_stack+0x15/0x17 [ 139.648345][T27681] should_fail+0x3c6/0x510 [ 139.652602][T27681] should_fail_usercopy+0x1a/0x20 [ 139.657456][T27681] _copy_to_user+0x20/0x90 [ 139.661706][T27681] simple_read_from_buffer+0xc7/0x150 [ 139.666916][T27681] proc_fail_nth_read+0x1a3/0x210 10:28:58 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{0x0}, {&(0x7f00000018c0)=""/169, 0xa9}], 0x2, 0x0) 10:28:58 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:28:58 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) [ 139.671772][T27681] ? proc_fault_inject_write+0x390/0x390 [ 139.677248][T27681] ? fsnotify_perm+0x470/0x5d0 [ 139.681842][T27681] ? security_file_permission+0x86/0xb0 [ 139.687224][T27681] ? proc_fault_inject_write+0x390/0x390 [ 139.692692][T27681] vfs_read+0x27d/0xd40 [ 139.696785][T27681] ? kernel_read+0x1f0/0x1f0 [ 139.701198][T27681] ? __kasan_check_write+0x14/0x20 [ 139.706147][T27681] ? mutex_lock+0xb6/0x1e0 [ 139.710394][T27681] ? wait_for_completion_killable_timeout+0x10/0x10 [ 139.716824][T27681] ? __fdget_pos+0x278/0x310 [ 139.721254][T27681] ? ksys_read+0x77/0x2c0 [ 139.725412][T27681] ksys_read+0x199/0x2c0 [ 139.729491][T27681] ? vfs_write+0x1110/0x1110 [ 139.733917][T27681] ? debug_smp_processor_id+0x17/0x20 [ 139.739122][T27681] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 139.745025][T27681] __x64_sys_read+0x7b/0x90 [ 139.749366][T27681] do_syscall_64+0x3d/0xb0 [ 139.753620][T27681] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 139.759345][T27681] RIP: 0033:0x7fee191ae78c [ 139.763599][T27681] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 139.783040][T27681] RSP: 002b:00007fee17f320c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 139.791309][T27681] RAX: ffffffffffffffda RBX: 00007fee192cef80 RCX: 00007fee191ae78c [ 139.799097][T27681] RDX: 000000000000000f RSI: 00007fee17f32130 RDI: 0000000000000003 [ 139.806909][T27681] RBP: 00007fee17f32120 R08: 0000000000000000 R09: 0000000000000000 [ 139.814715][T27681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 139.822526][T27681] R13: 000000000000000b R14: 00007fee192cef80 R15: 00007ffefed6f5a8 [ 139.830342][T27681] [ 139.833224][T27691] CPU: 0 PID: 27691 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 139.843362][T27691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 10:28:58 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:28:58 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 2) [ 139.844487][ T30] audit: type=1400 audit(1691922538.329:126): avc: denied { remove_name } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 139.853255][T27691] Call Trace: [ 139.853261][T27691] [ 139.853268][T27691] dump_stack_lvl+0x151/0x1b7 [ 139.884847][ T30] audit: type=1400 audit(1691922538.329:127): avc: denied { rename } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 139.885800][T27691] ? io_uring_drop_tctx_refs+0x190/0x190 [ 139.913058][T27691] ? do_handle_mm_fault+0x1949/0x2330 [ 139.918274][T27691] dump_stack+0x15/0x17 10:28:58 executing program 1: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:58 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:28:58 executing program 5: process_vm_readv(0x0, 0x0, 0x2, 0x0, 0x0, 0x0) [ 139.918302][T27691] should_fail+0x3c6/0x510 [ 139.918324][T27691] should_fail_usercopy+0x1a/0x20 [ 139.918343][T27691] _copy_from_user+0x20/0xd0 [ 139.918363][T27691] copy_clone_args_from_user+0x1c9/0x830 [ 139.918387][T27691] ? __delayed_free_task+0x20/0x20 [ 139.918405][T27691] ? vfs_write+0x9ec/0x1110 [ 139.918427][T27691] __x64_sys_clone3+0x122/0x3a0 [ 139.918446][T27691] ? wait_for_completion_killable_timeout+0x10/0x10 [ 139.918466][T27691] ? __ia32_sys_clone+0x290/0x290 [ 139.918487][T27691] ? fput+0x1a/0x20 [ 139.918503][T27691] ? debug_smp_processor_id+0x17/0x20 [ 139.918523][T27691] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 139.918543][T27691] ? exit_to_user_mode_prepare+0x39/0xa0 [ 139.918562][T27691] do_syscall_64+0x3d/0xb0 [ 139.918580][T27691] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 139.918598][T27691] RIP: 0033:0x7f52511e2ae9 [ 139.918614][T27691] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 139.918630][T27691] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 139.918651][T27691] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 139.918664][T27691] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 139.918677][T27691] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 139.918689][T27691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 139.918701][T27691] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 139.918717][T27691] [ 139.932425][T27711] FAULT_INJECTION: forcing a failure. [ 139.932425][T27711] name failslab, interval 1, probability 0, space 0, times 0 [ 139.932451][T27711] CPU: 1 PID: 27711 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 139.932472][T27711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 139.932481][T27711] Call Trace: [ 139.932486][T27711] [ 139.932492][T27711] dump_stack_lvl+0x151/0x1b7 [ 139.932517][T27711] ? io_uring_drop_tctx_refs+0x190/0x190 [ 139.932538][T27711] dump_stack+0x15/0x17 [ 139.932554][T27711] should_fail+0x3c6/0x510 [ 139.932575][T27711] __should_failslab+0xa4/0xe0 [ 139.932592][T27711] ? dup_task_struct+0x53/0xc60 [ 139.932612][T27711] should_failslab+0x9/0x20 [ 139.932627][T27711] slab_pre_alloc_hook+0x37/0xd0 [ 139.932646][T27711] ? dup_task_struct+0x53/0xc60 [ 139.932663][T27711] kmem_cache_alloc+0x44/0x200 [ 139.932681][T27711] dup_task_struct+0x53/0xc60 [ 139.932699][T27711] ? __kasan_check_write+0x14/0x20 [ 139.932716][T27711] copy_process+0x5c4/0x3260 [ 139.932736][T27711] ? check_stack_object+0xf4/0x130 [ 139.932753][T27711] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 139.932772][T27711] ? copy_clone_args_from_user+0x744/0x830 [ 139.932793][T27711] kernel_clone+0x21e/0x9e0 [ 139.932810][T27711] ? __delayed_free_task+0x20/0x20 [ 139.932828][T27711] ? vfs_write+0x9ec/0x1110 [ 139.932846][T27711] ? create_io_thread+0x1e0/0x1e0 [ 139.932866][T27711] __x64_sys_clone3+0x376/0x3a0 [ 139.932885][T27711] ? __ia32_sys_clone+0x290/0x290 [ 139.932905][T27711] ? fput+0x1a/0x20 [ 139.932922][T27711] ? debug_smp_processor_id+0x17/0x20 [ 139.932940][T27711] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 139.932960][T27711] ? exit_to_user_mode_prepare+0x39/0xa0 [ 139.932979][T27711] do_syscall_64+0x3d/0xb0 [ 139.932996][T27711] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 139.933014][T27711] RIP: 0033:0x7f52511e2ae9 [ 139.933028][T27711] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 139.933043][T27711] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 139.933063][T27711] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 139.933077][T27711] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 139.933089][T27711] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 10:28:58 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 3) 10:28:58 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:28:58 executing program 5: process_vm_readv(0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0) 10:28:58 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:28:58 executing program 0: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) 10:28:58 executing program 1: process_vm_readv(0x0, 0x0, 0x2, 0x0, 0x0, 0x0) 10:28:58 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:28:58 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}], 0x1, 0x0) 10:28:58 executing program 1: process_vm_readv(0x0, 0x0, 0x2, 0x0, 0x0, 0x0) 10:28:58 executing program 5: process_vm_readv(0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0) [ 139.933101][T27711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 139.933112][T27711] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 139.933128][T27711] [ 140.361127][T27723] FAULT_INJECTION: forcing a failure. [ 140.361127][T27723] name failslab, interval 1, probability 0, space 0, times 0 10:28:58 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:28:58 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x2, 0x0) [ 140.398727][T27723] CPU: 1 PID: 27723 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 140.408891][T27723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 140.418785][T27723] Call Trace: [ 140.421912][T27723] [ 140.424686][T27723] dump_stack_lvl+0x151/0x1b7 [ 140.429199][T27723] ? io_uring_drop_tctx_refs+0x190/0x190 [ 140.434667][T27723] dump_stack+0x15/0x17 [ 140.438672][T27723] should_fail+0x3c6/0x510 [ 140.443001][T27723] __should_failslab+0xa4/0xe0 [ 140.447610][T27723] ? prepare_creds+0x2f/0x6a0 [ 140.452108][T27723] should_failslab+0x9/0x20 [ 140.456447][T27723] slab_pre_alloc_hook+0x37/0xd0 [ 140.461225][T27723] ? prepare_creds+0x2f/0x6a0 [ 140.465739][T27723] kmem_cache_alloc+0x44/0x200 [ 140.470339][T27723] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 140.475630][T27723] prepare_creds+0x2f/0x6a0 [ 140.479981][T27723] copy_creds+0xf0/0x630 [ 140.484050][T27723] ? dup_task_struct+0x7e6/0xc60 [ 140.488821][T27723] copy_process+0x7c3/0x3260 [ 140.493248][T27723] ? check_stack_object+0xf4/0x130 [ 140.498195][T27723] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 140.503139][T27723] ? copy_clone_args_from_user+0x744/0x830 [ 140.508782][T27723] kernel_clone+0x21e/0x9e0 [ 140.513119][T27723] ? __delayed_free_task+0x20/0x20 [ 140.518070][T27723] ? vfs_write+0x9ec/0x1110 [ 140.522407][T27723] ? create_io_thread+0x1e0/0x1e0 [ 140.527360][T27723] __x64_sys_clone3+0x376/0x3a0 [ 140.532043][T27723] ? __ia32_sys_clone+0x290/0x290 [ 140.536903][T27723] ? fput+0x1a/0x20 [ 140.540546][T27723] ? debug_smp_processor_id+0x17/0x20 [ 140.545753][T27723] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 140.551656][T27723] ? exit_to_user_mode_prepare+0x39/0xa0 [ 140.557139][T27723] do_syscall_64+0x3d/0xb0 [ 140.561376][T27723] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 140.567102][T27723] RIP: 0033:0x7f52511e2ae9 [ 140.571358][T27723] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 140.590971][T27723] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 10:28:59 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 4) 10:28:59 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}], 0x1, 0x0) 10:28:59 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:28:59 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0) 10:28:59 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:28:59 executing program 1: process_vm_readv(0x0, 0x0, 0x2, 0x0, 0x0, 0x0) 10:28:59 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) 10:28:59 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}], 0x1, 0x0) 10:28:59 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:28:59 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0) [ 140.599219][T27723] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 140.607029][T27723] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 140.614838][T27723] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 140.622649][T27723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.630810][T27723] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 140.638622][T27723] 10:28:59 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:28:59 executing program 1: process_vm_readv(0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0) [ 140.699322][T27766] FAULT_INJECTION: forcing a failure. [ 140.699322][T27766] name failslab, interval 1, probability 0, space 0, times 0 [ 140.713995][T27766] CPU: 0 PID: 27766 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 140.724157][T27766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 140.734127][T27766] Call Trace: [ 140.737251][T27766] [ 140.740027][T27766] dump_stack_lvl+0x151/0x1b7 [ 140.744541][T27766] ? io_uring_drop_tctx_refs+0x190/0x190 [ 140.750012][T27766] dump_stack+0x15/0x17 [ 140.754000][T27766] should_fail+0x3c6/0x510 [ 140.758252][T27766] __should_failslab+0xa4/0xe0 [ 140.762857][T27766] ? alloc_vmap_area+0x19e/0x1a80 [ 140.767717][T27766] should_failslab+0x9/0x20 [ 140.772052][T27766] slab_pre_alloc_hook+0x37/0xd0 [ 140.776827][T27766] ? alloc_vmap_area+0x19e/0x1a80 [ 140.781686][T27766] kmem_cache_alloc+0x44/0x200 [ 140.786293][T27766] alloc_vmap_area+0x19e/0x1a80 [ 140.790981][T27766] ? vm_map_ram+0xa90/0xa90 [ 140.795313][T27766] ? kmem_cache_alloc_trace+0x115/0x210 [ 140.800695][T27766] ? __get_vm_area_node+0x117/0x360 [ 140.805729][T27766] __get_vm_area_node+0x158/0x360 [ 140.810590][T27766] __vmalloc_node_range+0xe2/0x8d0 [ 140.815545][T27766] ? copy_process+0x5c4/0x3260 [ 140.820144][T27766] ? slab_post_alloc_hook+0x72/0x2c0 [ 140.825259][T27766] ? dup_task_struct+0x53/0xc60 [ 140.829946][T27766] ? dup_task_struct+0x53/0xc60 [ 140.834715][T27766] dup_task_struct+0x416/0xc60 [ 140.839317][T27766] ? copy_process+0x5c4/0x3260 [ 140.843916][T27766] ? __kasan_check_write+0x14/0x20 [ 140.848862][T27766] copy_process+0x5c4/0x3260 [ 140.853290][T27766] ? check_stack_object+0xf4/0x130 [ 140.858239][T27766] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 140.863183][T27766] ? copy_clone_args_from_user+0x744/0x830 [ 140.868830][T27766] kernel_clone+0x21e/0x9e0 [ 140.873164][T27766] ? __delayed_free_task+0x20/0x20 [ 140.878124][T27766] ? vfs_write+0x9ec/0x1110 [ 140.882456][T27766] ? create_io_thread+0x1e0/0x1e0 [ 140.887314][T27766] __x64_sys_clone3+0x376/0x3a0 [ 140.892090][T27766] ? __ia32_sys_clone+0x290/0x290 [ 140.896944][T27766] ? fput+0x1a/0x20 [ 140.900680][T27766] ? debug_smp_processor_id+0x17/0x20 [ 140.905884][T27766] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 140.911792][T27766] ? exit_to_user_mode_prepare+0x39/0xa0 [ 140.917259][T27766] do_syscall_64+0x3d/0xb0 [ 140.921506][T27766] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 140.927240][T27766] RIP: 0033:0x7f52511e2ae9 [ 140.931493][T27766] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 140.950935][T27766] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 140.959263][T27766] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 140.967163][T27766] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 140.974970][T27766] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 140.982781][T27766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.990596][T27766] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 140.998418][T27766] [ 141.001908][T27766] syz-executor.2: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 141.017180][T27766] CPU: 0 PID: 27766 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 141.027326][T27766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 141.037220][T27766] Call Trace: [ 141.040341][T27766] [ 141.043122][T27766] dump_stack_lvl+0x151/0x1b7 [ 141.047655][T27766] ? io_uring_drop_tctx_refs+0x190/0x190 [ 141.053108][T27766] ? pr_cont_kernfs_name+0xf0/0x100 [ 141.058137][T27766] dump_stack+0x15/0x17 [ 141.062128][T27766] warn_alloc+0x21a/0x390 [ 141.066295][T27766] ? zone_watermark_ok_safe+0x270/0x270 [ 141.071675][T27766] ? __get_vm_area_node+0x16e/0x360 [ 141.076713][T27766] __vmalloc_node_range+0x2c1/0x8d0 [ 141.081741][T27766] ? slab_post_alloc_hook+0x72/0x2c0 [ 141.086863][T27766] ? dup_task_struct+0x53/0xc60 [ 141.091548][T27766] ? dup_task_struct+0x53/0xc60 [ 141.096235][T27766] dup_task_struct+0x416/0xc60 [ 141.100837][T27766] ? copy_process+0x5c4/0x3260 [ 141.105435][T27766] ? __kasan_check_write+0x14/0x20 [ 141.110382][T27766] copy_process+0x5c4/0x3260 [ 141.114810][T27766] ? check_stack_object+0xf4/0x130 [ 141.119756][T27766] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 141.124702][T27766] ? copy_clone_args_from_user+0x744/0x830 [ 141.130344][T27766] kernel_clone+0x21e/0x9e0 [ 141.134684][T27766] ? __delayed_free_task+0x20/0x20 [ 141.139632][T27766] ? vfs_write+0x9ec/0x1110 [ 141.143971][T27766] ? create_io_thread+0x1e0/0x1e0 [ 141.148831][T27766] __x64_sys_clone3+0x376/0x3a0 [ 141.153520][T27766] ? __ia32_sys_clone+0x290/0x290 [ 141.158381][T27766] ? fput+0x1a/0x20 [ 141.162037][T27766] ? debug_smp_processor_id+0x17/0x20 [ 141.167229][T27766] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 141.173135][T27766] ? exit_to_user_mode_prepare+0x39/0xa0 [ 141.178600][T27766] do_syscall_64+0x3d/0xb0 [ 141.182856][T27766] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 141.188585][T27766] RIP: 0033:0x7f52511e2ae9 [ 141.192841][T27766] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 141.212277][T27766] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 141.220521][T27766] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 141.228331][T27766] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 141.236152][T27766] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 141.243960][T27766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 141.251765][T27766] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 141.259578][T27766] [ 141.262760][T27766] Mem-Info: [ 141.265675][T27766] active_anon:287 inactive_anon:14231 isolated_anon:0 [ 141.265675][T27766] active_file:4051 inactive_file:9107 isolated_file:0 [ 141.265675][T27766] unevictable:0 dirty:19 writeback:0 [ 141.265675][T27766] slab_reclaimable:9894 slab_unreclaimable:74979 [ 141.265675][T27766] mapped:28653 shmem:346 pagetables:555 bounce:0 [ 141.265675][T27766] kernel_misc_reclaimable:0 [ 141.265675][T27766] free:1554816 free_pcp:24578 free_cma:0 [ 141.307132][T27766] Node 0 active_anon:1148kB inactive_anon:56924kB active_file:16204kB inactive_file:36428kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:114612kB dirty:76kB writeback:0kB shmem:1384kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4508kB pagetables:2220kB all_unreclaimable? no [ 141.337583][T27766] DMA32 free:2976724kB min:62592kB low:78240kB high:93888kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2981512kB mlocked:0kB bounce:0kB free_pcp:4788kB local_pcp:2972kB free_cma:0kB [ 141.364639][T27766] lowmem_reserve[]: 0 3941 3941 [ 141.369327][T27766] Normal free:3242540kB min:84860kB low:106072kB high:127284kB reserved_highatomic:0KB active_anon:1148kB inactive_anon:56924kB active_file:16204kB inactive_file:36428kB unevictable:0kB writepending:76kB present:5242880kB managed:4035848kB mlocked:0kB bounce:0kB free_pcp:93548kB local_pcp:53024kB free_cma:0kB [ 141.398232][T27766] lowmem_reserve[]: 0 0 0 [ 141.402350][T27766] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 4*2048kB (UM) 723*4096kB (M) = 2976724kB [ 141.417575][T27766] Normal: 1351*4kB (UME) 952*8kB (UME) 575*16kB (UME) 255*32kB (UME) 342*64kB (UME) 110*128kB (UME) 17*256kB (UME) 1*512kB (M) 1*1024kB (U) 4*2048kB (UME) 772*4096kB (M) = 3242540kB [ 141.435490][T27766] 13504 total pagecache pages [ 141.440018][T27766] 0 pages in swap cache [ 141.443892][T27766] Swap cache stats: add 0, delete 0, find 0/0 10:28:59 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 5) 10:28:59 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:28:59 executing program 1: process_vm_readv(0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0) 10:28:59 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) 10:28:59 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) 10:28:59 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:28:59 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:29:00 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) [ 141.449817][T27766] Free swap = 124996kB [ 141.453788][T27766] Total swap = 124996kB [ 141.457806][T27766] 2097051 pages RAM [ 141.461424][T27766] 0 pages HighMem/MovableOnly [ 141.465935][T27766] 342711 pages reserved [ 141.469953][T27766] 0 pages cma reserved 10:29:00 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000) 10:29:00 executing program 1: process_vm_readv(0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0) 10:29:00 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) 10:29:00 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) [ 141.550509][T27791] FAULT_INJECTION: forcing a failure. [ 141.550509][T27791] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 141.566206][T27791] CPU: 0 PID: 27791 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 141.576359][T27791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 141.586250][T27791] Call Trace: [ 141.589372][T27791] [ 141.592147][T27791] dump_stack_lvl+0x151/0x1b7 [ 141.596660][T27791] ? io_uring_drop_tctx_refs+0x190/0x190 [ 141.602134][T27791] ? arch_stack_walk+0xf3/0x140 [ 141.606824][T27791] dump_stack+0x15/0x17 [ 141.610807][T27791] should_fail+0x3c6/0x510 [ 141.615061][T27791] should_fail_alloc_page+0x5a/0x80 [ 141.620095][T27791] prepare_alloc_pages+0x15c/0x700 [ 141.625044][T27791] ? __alloc_pages_bulk+0xf50/0xf50 [ 141.630078][T27791] __alloc_pages+0x138/0x5e0 [ 141.634501][T27791] ? do_syscall_64+0x3d/0xb0 [ 141.638929][T27791] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 141.644831][T27791] ? zone_watermark_fast+0x220/0x220 [ 141.649950][T27791] __get_free_pages+0xe/0x30 [ 141.654379][T27791] kasan_populate_vmalloc_pte+0x39/0x130 [ 141.659845][T27791] ? __apply_to_page_range+0x8ca/0xbe0 [ 141.665140][T27791] __apply_to_page_range+0x8dd/0xbe0 [ 141.670283][T27791] ? kasan_populate_vmalloc+0x70/0x70 [ 141.675468][T27791] ? kasan_populate_vmalloc+0x70/0x70 [ 141.680673][T27791] apply_to_page_range+0x3b/0x50 [ 141.685457][T27791] kasan_populate_vmalloc+0x65/0x70 [ 141.690483][T27791] alloc_vmap_area+0x192f/0x1a80 [ 141.695437][T27791] ? vm_map_ram+0xa90/0xa90 [ 141.699770][T27791] ? kmem_cache_alloc_trace+0x115/0x210 [ 141.705149][T27791] ? __get_vm_area_node+0x117/0x360 [ 141.710190][T27791] __get_vm_area_node+0x158/0x360 [ 141.715043][T27791] __vmalloc_node_range+0xe2/0x8d0 [ 141.719992][T27791] ? copy_process+0x5c4/0x3260 [ 141.724593][T27791] ? slab_post_alloc_hook+0x72/0x2c0 [ 141.729711][T27791] ? dup_task_struct+0x53/0xc60 [ 141.734398][T27791] ? dup_task_struct+0x53/0xc60 [ 141.739085][T27791] dup_task_struct+0x416/0xc60 [ 141.743685][T27791] ? copy_process+0x5c4/0x3260 [ 141.748286][T27791] ? __kasan_check_write+0x14/0x20 [ 141.753318][T27791] copy_process+0x5c4/0x3260 [ 141.757747][T27791] ? check_stack_object+0xf4/0x130 [ 141.762693][T27791] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 141.767642][T27791] ? copy_clone_args_from_user+0x744/0x830 [ 141.773283][T27791] kernel_clone+0x21e/0x9e0 [ 141.777633][T27791] ? __delayed_free_task+0x20/0x20 [ 141.782572][T27791] ? vfs_write+0x9ec/0x1110 [ 141.786910][T27791] ? create_io_thread+0x1e0/0x1e0 [ 141.791772][T27791] __x64_sys_clone3+0x376/0x3a0 [ 141.796458][T27791] ? __ia32_sys_clone+0x290/0x290 [ 141.801318][T27791] ? fput+0x1a/0x20 [ 141.804962][T27791] ? debug_smp_processor_id+0x17/0x20 [ 141.810168][T27791] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 141.816070][T27791] ? exit_to_user_mode_prepare+0x39/0xa0 [ 141.821538][T27791] do_syscall_64+0x3d/0xb0 [ 141.825801][T27791] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 141.831526][T27791] RIP: 0033:0x7f52511e2ae9 [ 141.835774][T27791] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 141.855223][T27791] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 141.863458][T27791] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 141.871272][T27791] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 141.879081][T27791] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 141.886892][T27791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 10:29:00 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 6) 10:29:00 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000) 10:29:00 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f00000018c0)=""/169, 0xa9}], 0x1, 0x0) 10:29:00 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:29:00 executing program 1: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) 10:29:00 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) [ 141.894703][T27791] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 141.902521][T27791] 10:29:00 executing program 1: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) 10:29:00 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) r2 = getpid() syz_open_procfs$userns(r2, 0x0) r3 = getpid() syz_open_procfs$userns(r3, 0x0) r4 = getpid() process_vm_readv(r4, 0x0, 0x63, 0x0, 0x20, 0x0) 10:29:00 executing program 0: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:29:00 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f00000018c0)=""/169, 0xa9}], 0x1, 0x0) 10:29:00 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) 10:29:00 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f00000018c0)=""/169, 0xa9}], 0x1, 0x0) [ 141.932512][T27804] FAULT_INJECTION: forcing a failure. [ 141.932512][T27804] name failslab, interval 1, probability 0, space 0, times 0 [ 141.956715][T27804] CPU: 0 PID: 27804 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 141.966873][T27804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 141.976769][T27804] Call Trace: [ 141.979893][T27804] [ 141.982673][T27804] dump_stack_lvl+0x151/0x1b7 [ 141.987182][T27804] ? io_uring_drop_tctx_refs+0x190/0x190 [ 141.992654][T27804] dump_stack+0x15/0x17 [ 141.996643][T27804] should_fail+0x3c6/0x510 [ 142.000898][T27804] __should_failslab+0xa4/0xe0 [ 142.005495][T27804] should_failslab+0x9/0x20 [ 142.009831][T27804] slab_pre_alloc_hook+0x37/0xd0 [ 142.014693][T27804] kmem_cache_alloc_trace+0x48/0x210 [ 142.019817][T27804] ? alloc_fdtable+0xaf/0x2a0 [ 142.024328][T27804] alloc_fdtable+0xaf/0x2a0 [ 142.028669][T27804] dup_fd+0x759/0xb00 [ 142.032485][T27804] ? avc_has_perm+0x16f/0x260 [ 142.036998][T27804] copy_files+0xe6/0x200 [ 142.041073][T27804] ? perf_event_attrs+0x30/0x30 [ 142.045761][T27804] ? dup_task_struct+0xc60/0xc60 [ 142.050541][T27804] ? security_task_alloc+0xf9/0x130 [ 142.055626][T27804] copy_process+0x11f3/0x3260 [ 142.060085][T27804] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 142.065033][T27804] ? copy_clone_args_from_user+0x744/0x830 [ 142.070672][T27804] kernel_clone+0x21e/0x9e0 [ 142.075013][T27804] ? __delayed_free_task+0x20/0x20 [ 142.079956][T27804] ? vfs_write+0x9ec/0x1110 [ 142.084308][T27804] ? create_io_thread+0x1e0/0x1e0 [ 142.089160][T27804] __x64_sys_clone3+0x376/0x3a0 [ 142.093845][T27804] ? __ia32_sys_clone+0x290/0x290 [ 142.098705][T27804] ? fput+0x1a/0x20 [ 142.102350][T27804] ? debug_smp_processor_id+0x17/0x20 [ 142.107562][T27804] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 142.113458][T27804] ? exit_to_user_mode_prepare+0x39/0xa0 [ 142.118928][T27804] do_syscall_64+0x3d/0xb0 [ 142.123180][T27804] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 142.128905][T27804] RIP: 0033:0x7f52511e2ae9 [ 142.133161][T27804] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 142.152603][T27804] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 142.160849][T27804] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 142.168657][T27804] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 10:29:00 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 7) 10:29:00 executing program 1: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) 10:29:00 executing program 0: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:29:00 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) (async) r1 = getpid() syz_open_procfs$userns(r1, 0x0) (async) r2 = getpid() syz_open_procfs$userns(r2, 0x0) r3 = getpid() syz_open_procfs$userns(r3, 0x0) (async) r4 = getpid() process_vm_readv(r4, 0x0, 0x63, 0x0, 0x20, 0x0) 10:29:00 executing program 4: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) r2 = getpid() syz_open_procfs$userns(r2, 0x0) r3 = getpid() syz_open_procfs$userns(r3, 0x0) r4 = getpid() process_vm_readv(r4, 0x0, 0x63, 0x0, 0x20, 0x0) 10:29:00 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) 10:29:00 executing program 0: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) [ 142.176472][T27804] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 142.184278][T27804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.192089][T27804] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 142.199909][T27804] 10:29:00 executing program 1: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) 10:29:00 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (fail_nth: 1) [ 142.229160][T27826] FAULT_INJECTION: forcing a failure. [ 142.229160][T27826] name failslab, interval 1, probability 0, space 0, times 0 [ 142.242709][T27826] CPU: 0 PID: 27826 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 142.252856][T27826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 142.262749][T27826] Call Trace: [ 142.265873][T27826] [ 142.268649][T27826] dump_stack_lvl+0x151/0x1b7 [ 142.273158][T27826] ? io_uring_drop_tctx_refs+0x190/0x190 [ 142.278632][T27826] dump_stack+0x15/0x17 [ 142.282625][T27826] should_fail+0x3c6/0x510 [ 142.286876][T27826] __should_failslab+0xa4/0xe0 [ 142.291476][T27826] should_failslab+0x9/0x20 [ 142.292208][T27832] FAULT_INJECTION: forcing a failure. [ 142.292208][T27832] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 142.295811][T27826] slab_pre_alloc_hook+0x37/0xd0 [ 142.295837][T27826] __kmalloc+0x6d/0x270 [ 142.317428][T27826] ? __vmalloc_node_range+0x2d6/0x8d0 [ 142.322635][T27826] __vmalloc_node_range+0x2d6/0x8d0 10:29:00 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:29:00 executing program 4: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) r2 = getpid() syz_open_procfs$userns(r2, 0x0) r3 = getpid() syz_open_procfs$userns(r3, 0x0) r4 = getpid() process_vm_readv(r4, 0x0, 0x63, 0x0, 0x20, 0x0) 10:29:00 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) (async) r1 = getpid() syz_open_procfs$userns(r1, 0x0) (async) r2 = getpid() syz_open_procfs$userns(r2, 0x0) (async) r3 = getpid() syz_open_procfs$userns(r3, 0x0) (async) r4 = getpid() process_vm_readv(r4, 0x0, 0x63, 0x0, 0x20, 0x0) [ 142.327669][T27826] ? dup_task_struct+0x53/0xc60 [ 142.332357][T27826] dup_task_struct+0x416/0xc60 [ 142.336971][T27826] ? copy_process+0x5c4/0x3260 [ 142.341553][T27826] ? __kasan_check_write+0x14/0x20 [ 142.346501][T27826] copy_process+0x5c4/0x3260 [ 142.350929][T27826] ? check_stack_object+0xf4/0x130 [ 142.355870][T27826] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 142.360911][T27826] ? copy_clone_args_from_user+0x744/0x830 [ 142.366546][T27826] kernel_clone+0x21e/0x9e0 [ 142.370889][T27826] ? __delayed_free_task+0x20/0x20 [ 142.375830][T27826] ? vfs_write+0x9ec/0x1110 [ 142.380174][T27826] ? create_io_thread+0x1e0/0x1e0 [ 142.385036][T27826] __x64_sys_clone3+0x376/0x3a0 [ 142.389720][T27826] ? __ia32_sys_clone+0x290/0x290 [ 142.394584][T27826] ? fput+0x1a/0x20 [ 142.398225][T27826] ? debug_smp_processor_id+0x17/0x20 [ 142.403435][T27826] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 142.409347][T27826] ? exit_to_user_mode_prepare+0x39/0xa0 [ 142.414804][T27826] do_syscall_64+0x3d/0xb0 [ 142.419055][T27826] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 142.424783][T27826] RIP: 0033:0x7f52511e2ae9 [ 142.429039][T27826] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 142.448481][T27826] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 142.456719][T27826] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 142.464531][T27826] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 142.472431][T27826] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 10:29:01 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 8) 10:29:01 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:29:01 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() process_vm_readv(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000001080)={'wpan3\x00'}) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) ioctl$FIGETBSZ(r4, 0x2, &(0x7f0000000180)) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x60, r3, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x18}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x53}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x5}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x24000000) 10:29:01 executing program 1: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) [ 142.480244][T27826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.488055][T27826] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 142.495874][T27826] [ 142.501432][T27832] CPU: 0 PID: 27832 Comm: syz-executor.3 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 142.511574][T27832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 142.521471][T27832] Call Trace: [ 142.524679][T27832] [ 142.527462][T27832] dump_stack_lvl+0x151/0x1b7 [ 142.531970][T27832] ? io_uring_drop_tctx_refs+0x190/0x190 [ 142.537439][T27832] dump_stack+0x15/0x17 [ 142.537901][T27849] FAULT_INJECTION: forcing a failure. [ 142.537901][T27849] name failslab, interval 1, probability 0, space 0, times 0 [ 142.541424][T27832] should_fail+0x3c6/0x510 [ 142.541450][T27832] should_fail_usercopy+0x1a/0x20 [ 142.562953][T27832] _copy_from_user+0x20/0xd0 [ 142.567379][T27832] iovec_from_user+0xc7/0x330 [ 142.571897][T27832] __import_iovec+0x6d/0x420 [ 142.576317][T27832] ? kstrtouint_from_user+0x20a/0x2a0 [ 142.581524][T27832] import_iovec+0xe5/0x120 [ 142.585777][T27832] process_vm_rw+0x18a/0xcc0 [ 142.590203][T27832] ? selinux_file_permission+0x2c4/0x570 [ 142.595671][T27832] ? proc_fail_nth_read+0x210/0x210 [ 142.600702][T27832] ? fsnotify_perm+0x6a/0x5d0 [ 142.605219][T27832] ? __ia32_sys_process_vm_writev+0x100/0x100 [ 142.612081][T27832] ? vfs_write+0x9ec/0x1110 [ 142.616417][T27832] ? wait_for_completion_killable_timeout+0x10/0x10 [ 142.622843][T27832] ? fput+0x1a/0x20 [ 142.626481][T27832] ? ksys_write+0x260/0x2c0 [ 142.630825][T27832] ? debug_smp_processor_id+0x17/0x20 [ 142.636040][T27832] __x64_sys_process_vm_readv+0xe7/0x100 [ 142.641498][T27832] do_syscall_64+0x3d/0xb0 [ 142.645750][T27832] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 142.651496][T27832] RIP: 0033:0x7fd2f8876ae9 [ 142.655922][T27832] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 142.675343][T27832] RSP: 002b:00007fd2f75f90c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000136 [ 142.683591][T27832] RAX: ffffffffffffffda RBX: 00007fd2f8995f80 RCX: 00007fd2f8876ae9 [ 142.691399][T27832] RDX: 0000000000000001 RSI: 0000000020001800 RDI: 0000000000000000 [ 142.699210][T27832] RBP: 00007fd2f75f9120 R08: 0000000000000002 R09: 0000000000000000 [ 142.707021][T27832] R10: 0000000020001e40 R11: 0000000000000246 R12: 0000000000000001 [ 142.714836][T27832] R13: 000000000000000b R14: 00007fd2f8995f80 R15: 00007ffe0a11f158 [ 142.722649][T27832] 10:29:01 executing program 4: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) r2 = getpid() syz_open_procfs$userns(r2, 0x0) r3 = getpid() syz_open_procfs$userns(r3, 0x0) r4 = getpid() process_vm_readv(r4, 0x0, 0x63, 0x0, 0x20, 0x0) 10:29:01 executing program 4: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) r2 = getpid() syz_open_procfs$userns(r2, 0x0) r3 = getpid() syz_open_procfs$userns(r3, 0x0) process_vm_readv(0x0, 0x0, 0x63, 0x0, 0x20, 0x0) 10:29:01 executing program 4: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) r2 = getpid() syz_open_procfs$userns(r2, 0x0) getpid() process_vm_readv(0x0, 0x0, 0x63, 0x0, 0x20, 0x0) [ 142.725518][T27849] CPU: 1 PID: 27849 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 142.735669][T27849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 142.745650][T27849] Call Trace: [ 142.748773][T27849] [ 142.751551][T27849] dump_stack_lvl+0x151/0x1b7 [ 142.756060][T27849] ? io_uring_drop_tctx_refs+0x190/0x190 [ 142.761539][T27849] dump_stack+0x15/0x17 [ 142.765522][T27849] should_fail+0x3c6/0x510 [ 142.769787][T27849] __should_failslab+0xa4/0xe0 [ 142.774377][T27849] should_failslab+0x9/0x20 10:29:01 executing program 4: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) r2 = getpid() syz_open_procfs$userns(r2, 0x0) getpid() process_vm_readv(0x0, 0x0, 0x63, 0x0, 0x20, 0x0) [ 142.778723][T27849] slab_pre_alloc_hook+0x37/0xd0 [ 142.783491][T27849] __kmalloc+0x6d/0x270 [ 142.787485][T27849] ? __vmalloc_node_range+0x2d6/0x8d0 [ 142.792688][T27849] __vmalloc_node_range+0x2d6/0x8d0 [ 142.797724][T27849] ? dup_task_struct+0x53/0xc60 [ 142.802412][T27849] dup_task_struct+0x416/0xc60 [ 142.807011][T27849] ? copy_process+0x5c4/0x3260 [ 142.811607][T27849] ? __kasan_check_write+0x14/0x20 [ 142.816555][T27849] copy_process+0x5c4/0x3260 [ 142.820987][T27849] ? check_stack_object+0xf4/0x130 [ 142.825929][T27849] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 142.830874][T27849] ? copy_clone_args_from_user+0x744/0x830 [ 142.836515][T27849] kernel_clone+0x21e/0x9e0 [ 142.840854][T27849] ? __delayed_free_task+0x20/0x20 [ 142.845809][T27849] ? vfs_write+0x9ec/0x1110 [ 142.850140][T27849] ? create_io_thread+0x1e0/0x1e0 [ 142.855002][T27849] __x64_sys_clone3+0x376/0x3a0 [ 142.859687][T27849] ? __ia32_sys_clone+0x290/0x290 [ 142.864548][T27849] ? fput+0x1a/0x20 [ 142.868194][T27849] ? debug_smp_processor_id+0x17/0x20 [ 142.873399][T27849] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 142.879301][T27849] ? exit_to_user_mode_prepare+0x39/0xa0 [ 142.884770][T27849] do_syscall_64+0x3d/0xb0 [ 142.889023][T27849] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 142.894750][T27849] RIP: 0033:0x7f52511e2ae9 [ 142.899003][T27849] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 142.918446][T27849] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 10:29:01 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (fail_nth: 2) 10:29:01 executing program 4: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) r2 = getpid() syz_open_procfs$userns(r2, 0x0) process_vm_readv(0x0, 0x0, 0x63, 0x0, 0x20, 0x0) 10:29:01 executing program 1: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) 10:29:01 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) [ 142.926695][T27849] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 142.934501][T27849] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 142.942312][T27849] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 142.950123][T27849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.957934][T27849] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 142.965751][T27849] 10:29:01 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 9) 10:29:01 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) (async) r1 = getpid() process_vm_readv(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000001080)={'wpan3\x00'}) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) (async) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$FIGETBSZ(r4, 0x2, &(0x7f0000000180)) (async) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x60, r3, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x18}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x53}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x5}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x24000000) 10:29:01 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:29:01 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) getpid() (async) r1 = getpid() process_vm_readv(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000001080)={'wpan3\x00'}) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) ioctl$FIGETBSZ(r4, 0x2, &(0x7f0000000180)) (async) ioctl$FIGETBSZ(r4, 0x2, &(0x7f0000000180)) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x60, r3, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x18}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x53}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x5}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x24000000) [ 142.994561][T27867] FAULT_INJECTION: forcing a failure. [ 142.994561][T27867] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 143.011514][T27875] FAULT_INJECTION: forcing a failure. [ 143.011514][T27875] name failslab, interval 1, probability 0, space 0, times 0 [ 143.012871][T27867] CPU: 1 PID: 27867 Comm: syz-executor.3 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 143.034073][T27867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 10:29:01 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x40981, 0x0) syz_open_procfs$userns(0x0, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(0x0, &(0x7f0000001300)=[{&(0x7f0000000040)=""/218, 0xda}, {&(0x7f0000000140)=""/236, 0xec}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/155, 0x9b}], 0x4, &(0x7f0000001440)=[{&(0x7f0000001340)=""/156, 0x9c}, {&(0x7f0000001400)=""/64, 0x40}], 0x2, 0x0) 10:29:01 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x40981, 0x0) syz_open_procfs$userns(0x0, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(0x0, &(0x7f0000001300)=[{&(0x7f0000000040)=""/218, 0xda}, {&(0x7f0000000140)=""/236, 0xec}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/155, 0x9b}], 0x4, &(0x7f0000001440)=[{&(0x7f0000001340)=""/156, 0x9c}, {&(0x7f0000001400)=""/64, 0x40}], 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x40981, 0x0) (async) syz_open_procfs$userns(0x0, 0x0) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) process_vm_readv(0x0, &(0x7f0000001300)=[{&(0x7f0000000040)=""/218, 0xda}, {&(0x7f0000000140)=""/236, 0xec}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/155, 0x9b}], 0x4, &(0x7f0000001440)=[{&(0x7f0000001340)=""/156, 0x9c}, {&(0x7f0000001400)=""/64, 0x40}], 0x2, 0x0) (async) 10:29:01 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x40981, 0x0) syz_open_procfs$userns(0x0, 0x0) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(0x0, &(0x7f0000001300)=[{&(0x7f0000000040)=""/218, 0xda}, {&(0x7f0000000140)=""/236, 0xec}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/155, 0x9b}], 0x4, &(0x7f0000001440)=[{&(0x7f0000001340)=""/156, 0x9c}, {&(0x7f0000001400)=""/64, 0x40}], 0x2, 0x0) [ 143.043969][T27867] Call Trace: [ 143.047092][T27867] [ 143.049868][T27867] dump_stack_lvl+0x151/0x1b7 [ 143.054383][T27867] ? io_uring_drop_tctx_refs+0x190/0x190 [ 143.059864][T27867] ? iovec_from_user+0x2d9/0x330 [ 143.064629][T27867] dump_stack+0x15/0x17 [ 143.068622][T27867] should_fail+0x3c6/0x510 [ 143.072871][T27867] should_fail_usercopy+0x1a/0x20 [ 143.077732][T27867] _copy_from_user+0x20/0xd0 [ 143.082154][T27867] iovec_from_user+0xc7/0x330 [ 143.086674][T27867] process_vm_rw+0x2cd/0xcc0 10:29:01 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) process_vm_readv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 143.091095][T27867] ? selinux_file_permission+0x2c4/0x570 [ 143.096563][T27867] ? proc_fail_nth_read+0x210/0x210 [ 143.101597][T27867] ? fsnotify_perm+0x6a/0x5d0 [ 143.106114][T27867] ? __ia32_sys_process_vm_writev+0x100/0x100 [ 143.112013][T27867] ? vfs_write+0x9ec/0x1110 [ 143.116353][T27867] ? wait_for_completion_killable_timeout+0x10/0x10 [ 143.122774][T27867] ? fput+0x1a/0x20 [ 143.126503][T27867] ? ksys_write+0x260/0x2c0 [ 143.130849][T27867] ? debug_smp_processor_id+0x17/0x20 [ 143.136053][T27867] __x64_sys_process_vm_readv+0xe7/0x100 [ 143.141521][T27867] do_syscall_64+0x3d/0xb0 [ 143.145770][T27867] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 143.151584][T27867] RIP: 0033:0x7fd2f8876ae9 [ 143.155852][T27867] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 143.175367][T27867] RSP: 002b:00007fd2f75f90c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000136 [ 143.183611][T27867] RAX: ffffffffffffffda RBX: 00007fd2f8995f80 RCX: 00007fd2f8876ae9 [ 143.191421][T27867] RDX: 0000000000000001 RSI: 0000000020001800 RDI: 0000000000000000 [ 143.199236][T27867] RBP: 00007fd2f75f9120 R08: 0000000000000002 R09: 0000000000000000 [ 143.207133][T27867] R10: 0000000020001e40 R11: 0000000000000246 R12: 0000000000000001 [ 143.214941][T27867] R13: 000000000000000b R14: 00007fd2f8995f80 R15: 00007ffe0a11f158 [ 143.222758][T27867] [ 143.225618][T27875] CPU: 0 PID: 27875 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 143.235778][T27875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 143.245675][T27875] Call Trace: [ 143.248797][T27875] [ 143.251570][T27875] dump_stack_lvl+0x151/0x1b7 [ 143.255849][T27894] FAULT_INJECTION: forcing a failure. [ 143.255849][T27894] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 143.256088][T27875] ? io_uring_drop_tctx_refs+0x190/0x190 [ 143.274398][T27875] ? __kasan_check_write+0x14/0x20 [ 143.279343][T27875] ? _raw_spin_lock+0xa4/0x1b0 [ 143.283940][T27875] ? _raw_spin_trylock_bh+0x190/0x190 [ 143.289149][T27875] dump_stack+0x15/0x17 10:29:01 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (fail_nth: 3) [ 143.293144][T27875] should_fail+0x3c6/0x510 [ 143.297399][T27875] __should_failslab+0xa4/0xe0 [ 143.301994][T27875] ? copy_fs_struct+0x4e/0x230 [ 143.306597][T27875] should_failslab+0x9/0x20 [ 143.310935][T27875] slab_pre_alloc_hook+0x37/0xd0 [ 143.315707][T27875] ? copy_fs_struct+0x4e/0x230 [ 143.320310][T27875] kmem_cache_alloc+0x44/0x200 [ 143.324908][T27875] copy_fs_struct+0x4e/0x230 [ 143.329337][T27875] copy_fs+0x71/0x140 [ 143.333154][T27875] copy_process+0x121e/0x3260 [ 143.337762][T27875] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 143.342701][T27875] ? copy_clone_args_from_user+0x744/0x830 [ 143.348341][T27875] kernel_clone+0x21e/0x9e0 [ 143.352680][T27875] ? __delayed_free_task+0x20/0x20 [ 143.357628][T27875] ? vfs_write+0x9ec/0x1110 [ 143.361973][T27875] ? create_io_thread+0x1e0/0x1e0 [ 143.366833][T27875] __x64_sys_clone3+0x376/0x3a0 [ 143.371514][T27875] ? __ia32_sys_clone+0x290/0x290 [ 143.376375][T27875] ? fput+0x1a/0x20 [ 143.380023][T27875] ? debug_smp_processor_id+0x17/0x20 [ 143.385410][T27875] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 143.391314][T27875] ? exit_to_user_mode_prepare+0x39/0xa0 [ 143.396779][T27875] do_syscall_64+0x3d/0xb0 [ 143.401034][T27875] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 143.406759][T27875] RIP: 0033:0x7f52511e2ae9 [ 143.411021][T27875] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 143.430458][T27875] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 143.438701][T27875] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 143.446509][T27875] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 143.454324][T27875] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 143.462135][T27875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 143.469944][T27875] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 143.477766][T27875] [ 143.480622][T27894] CPU: 1 PID: 27894 Comm: syz-executor.3 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 143.490778][T27894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 143.500674][T27894] Call Trace: [ 143.503798][T27894] [ 143.506576][T27894] dump_stack_lvl+0x151/0x1b7 [ 143.511086][T27894] ? io_uring_drop_tctx_refs+0x190/0x190 [ 143.516558][T27894] dump_stack+0x15/0x17 [ 143.520546][T27894] should_fail+0x3c6/0x510 [ 143.524801][T27894] should_fail_usercopy+0x1a/0x20 [ 143.525216][T27903] FAULT_INJECTION: forcing a failure. [ 143.525216][T27903] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 143.529660][T27894] _copy_to_user+0x20/0x90 [ 143.529684][T27894] simple_read_from_buffer+0xc7/0x150 [ 143.529705][T27894] proc_fail_nth_read+0x1a3/0x210 [ 143.557011][T27894] ? proc_fault_inject_write+0x390/0x390 [ 143.562467][T27894] ? fsnotify_perm+0x470/0x5d0 [ 143.567072][T27894] ? security_file_permission+0x86/0xb0 [ 143.572565][T27894] ? proc_fault_inject_write+0x390/0x390 [ 143.578030][T27894] vfs_read+0x27d/0xd40 [ 143.582021][T27894] ? kernel_read+0x1f0/0x1f0 [ 143.586448][T27894] ? __kasan_check_write+0x14/0x20 [ 143.591399][T27894] ? mutex_lock+0xb6/0x1e0 [ 143.595646][T27894] ? wait_for_completion_killable_timeout+0x10/0x10 [ 143.602070][T27894] ? __fdget_pos+0x278/0x310 [ 143.606499][T27894] ? ksys_read+0x77/0x2c0 [ 143.610663][T27894] ksys_read+0x199/0x2c0 [ 143.614745][T27894] ? vfs_write+0x1110/0x1110 [ 143.619168][T27894] ? debug_smp_processor_id+0x17/0x20 [ 143.624374][T27894] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 143.630365][T27894] __x64_sys_read+0x7b/0x90 [ 143.634707][T27894] do_syscall_64+0x3d/0xb0 [ 143.638960][T27894] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 143.644685][T27894] RIP: 0033:0x7fd2f887578c [ 143.648952][T27894] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 143.668379][T27894] RSP: 002b:00007fd2f75f90c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 143.676619][T27894] RAX: ffffffffffffffda RBX: 00007fd2f8995f80 RCX: 00007fd2f887578c [ 143.684432][T27894] RDX: 000000000000000f RSI: 00007fd2f75f9130 RDI: 0000000000000003 10:29:01 executing program 4: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) getpid() process_vm_readv(0x0, 0x0, 0x63, 0x0, 0x20, 0x0) 10:29:01 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) process_vm_readv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) (async) process_vm_readv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 10:29:01 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) 10:29:02 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 10) 10:29:02 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:29:02 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:29:02 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40), 0x0, 0x0) 10:29:02 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40), 0x0, 0x0) 10:29:02 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40), 0x0, 0x0) 10:29:02 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x40981, 0x0) syz_open_procfs$userns(0x0, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(0x0, &(0x7f0000001300)=[{&(0x7f0000000040)=""/218, 0xda}, {&(0x7f0000000140)=""/236, 0xec}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/155, 0x9b}], 0x4, &(0x7f0000001440)=[{&(0x7f0000001340)=""/156, 0x9c}, {&(0x7f0000001400)=""/64, 0x40}], 0x2, 0x0) 10:29:02 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x40981, 0x0) syz_open_procfs$userns(0x0, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(0x0, &(0x7f0000001300)=[{&(0x7f0000000040)=""/218, 0xda}, {&(0x7f0000000140)=""/236, 0xec}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/155, 0x9b}], 0x4, &(0x7f0000001440)=[{&(0x7f0000001340)=""/156, 0x9c}, {&(0x7f0000001400)=""/64, 0x40}], 0x2, 0x0) 10:29:02 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) [ 143.692242][T27894] RBP: 00007fd2f75f9120 R08: 0000000000000000 R09: 0000000000000000 [ 143.700061][T27894] R10: 0000000020001e40 R11: 0000000000000246 R12: 0000000000000001 [ 143.707869][T27894] R13: 000000000000000b R14: 00007fd2f8995f80 R15: 00007ffe0a11f158 [ 143.715682][T27894] [ 143.718543][T27903] CPU: 0 PID: 27903 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 143.728700][T27903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 143.738682][T27903] Call Trace: [ 143.741910][T27903] [ 143.744670][T27903] dump_stack_lvl+0x151/0x1b7 [ 143.749184][T27903] ? io_uring_drop_tctx_refs+0x190/0x190 [ 143.754648][T27903] ? __kasan_slab_alloc+0x63/0xe0 [ 143.759507][T27903] dump_stack+0x15/0x17 [ 143.763496][T27903] should_fail+0x3c6/0x510 [ 143.767750][T27903] should_fail_alloc_page+0x5a/0x80 [ 143.772888][T27903] prepare_alloc_pages+0x15c/0x700 [ 143.777920][T27903] ? __alloc_pages_bulk+0xf50/0xf50 [ 143.782949][T27903] __alloc_pages+0x138/0x5e0 [ 143.787462][T27903] ? zone_watermark_fast+0x220/0x220 [ 143.792588][T27903] ? __kasan_kmalloc+0x9/0x10 [ 143.797092][T27903] ? __kmalloc+0x13a/0x270 [ 143.801344][T27903] ? __vmalloc_node_range+0x2d6/0x8d0 [ 143.806554][T27903] __vmalloc_node_range+0x482/0x8d0 [ 143.811590][T27903] dup_task_struct+0x416/0xc60 [ 143.816195][T27903] ? copy_process+0x5c4/0x3260 [ 143.820821][T27903] ? __kasan_check_write+0x14/0x20 [ 143.825742][T27903] copy_process+0x5c4/0x3260 [ 143.830166][T27903] ? check_stack_object+0xf4/0x130 [ 143.835108][T27903] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 143.840055][T27903] ? copy_clone_args_from_user+0x744/0x830 [ 143.845698][T27903] kernel_clone+0x21e/0x9e0 [ 143.850037][T27903] ? __delayed_free_task+0x20/0x20 [ 143.854982][T27903] ? vfs_write+0x9ec/0x1110 [ 143.859410][T27903] ? create_io_thread+0x1e0/0x1e0 [ 143.864269][T27903] __x64_sys_clone3+0x376/0x3a0 [ 143.868955][T27903] ? __ia32_sys_clone+0x290/0x290 [ 143.873825][T27903] ? fput+0x1a/0x20 [ 143.877460][T27903] ? debug_smp_processor_id+0x17/0x20 [ 143.882670][T27903] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 143.888572][T27903] ? exit_to_user_mode_prepare+0x39/0xa0 [ 143.894039][T27903] do_syscall_64+0x3d/0xb0 [ 143.898291][T27903] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 143.904044][T27903] RIP: 0033:0x7f52511e2ae9 [ 143.908277][T27903] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 143.927712][T27903] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 143.935959][T27903] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 10:29:02 executing program 4: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) process_vm_readv(0x0, 0x0, 0x63, 0x0, 0x20, 0x0) 10:29:02 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x40981, 0x0) syz_open_procfs$userns(0x0, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(0x0, &(0x7f0000001300)=[{&(0x7f0000000040)=""/218, 0xda}, {&(0x7f0000000140)=""/236, 0xec}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/155, 0x9b}], 0x4, &(0x7f0000001440)=[{&(0x7f0000001340)=""/156, 0x9c}, {&(0x7f0000001400)=""/64, 0x40}], 0x2, 0x0) 10:29:02 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) 10:29:02 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 11) 10:29:02 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x200003cc}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:02 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) process_vm_readv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:02 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x40981, 0x0) syz_open_procfs$userns(0x0, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:02 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) [ 143.943770][T27903] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 143.951584][T27903] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 143.959391][T27903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 143.967204][T27903] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 143.975018][T27903] [ 144.016418][T27936] FAULT_INJECTION: forcing a failure. [ 144.016418][T27936] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 144.034657][T27936] CPU: 1 PID: 27936 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 144.044817][T27936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 144.054714][T27936] Call Trace: [ 144.057840][T27936] [ 144.060612][T27936] dump_stack_lvl+0x151/0x1b7 10:29:02 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x40981, 0x0) syz_open_procfs$userns(0x0, 0x0) 10:29:02 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x7ffff000}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:02 executing program 4: r0 = getpid() syz_open_procfs$userns(r0, 0x0) getpid() process_vm_readv(0x0, 0x0, 0x63, 0x0, 0x20, 0x0) 10:29:02 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x40981, 0x0) 10:29:02 executing program 4: r0 = getpid() syz_open_procfs$userns(r0, 0x0) process_vm_readv(0x0, 0x0, 0x63, 0x0, 0x20, 0x0) 10:29:02 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x4, 0x1, 0x2, 0x7, 0x35, @loopback, @private1, 0x1, 0x8718, 0x3, 0x9b8}}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000800)={&(0x7f0000000240)={0x5a8, 0x0, 0x300, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x1e0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r1}}, {0x8}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8}, {0x1a8, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x20}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x1a8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfc}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x4000}, 0x80) [ 144.065129][T27936] ? io_uring_drop_tctx_refs+0x190/0x190 [ 144.070595][T27936] ? __kasan_slab_alloc+0x63/0xe0 [ 144.075455][T27936] dump_stack+0x15/0x17 [ 144.079444][T27936] should_fail+0x3c6/0x510 [ 144.083703][T27936] should_fail_alloc_page+0x5a/0x80 [ 144.088738][T27936] prepare_alloc_pages+0x15c/0x700 [ 144.093681][T27936] ? __alloc_pages_bulk+0xf50/0xf50 [ 144.098716][T27936] __alloc_pages+0x138/0x5e0 [ 144.103142][T27936] ? zone_watermark_fast+0x220/0x220 [ 144.108262][T27936] ? __kasan_kmalloc+0x9/0x10 10:29:02 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x40981, 0x0) [ 144.112775][T27936] ? __kmalloc+0x13a/0x270 [ 144.117026][T27936] ? __vmalloc_node_range+0x2d6/0x8d0 [ 144.122236][T27936] __vmalloc_node_range+0x482/0x8d0 [ 144.127270][T27936] dup_task_struct+0x416/0xc60 [ 144.131875][T27936] ? copy_process+0x5c4/0x3260 [ 144.136469][T27936] ? __kasan_check_write+0x14/0x20 [ 144.141414][T27936] copy_process+0x5c4/0x3260 [ 144.145842][T27936] ? check_stack_object+0xf4/0x130 [ 144.150790][T27936] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 144.155737][T27936] ? copy_clone_args_from_user+0x744/0x830 [ 144.161379][T27936] kernel_clone+0x21e/0x9e0 [ 144.165719][T27936] ? __delayed_free_task+0x20/0x20 [ 144.170664][T27936] ? vfs_write+0x9ec/0x1110 [ 144.175003][T27936] ? create_io_thread+0x1e0/0x1e0 [ 144.179869][T27936] __x64_sys_clone3+0x376/0x3a0 [ 144.184550][T27936] ? __ia32_sys_clone+0x290/0x290 [ 144.189497][T27936] ? fput+0x1a/0x20 [ 144.193138][T27936] ? debug_smp_processor_id+0x17/0x20 [ 144.198344][T27936] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 144.204248][T27936] ? exit_to_user_mode_prepare+0x39/0xa0 [ 144.209802][T27936] do_syscall_64+0x3d/0xb0 [ 144.214055][T27936] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 144.219783][T27936] RIP: 0033:0x7f52511e2ae9 [ 144.224037][T27936] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 144.243476][T27936] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 144.251722][T27936] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 144.259531][T27936] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 10:29:02 executing program 4: getpid() process_vm_readv(0x0, 0x0, 0x63, 0x0, 0x20, 0x0) 10:29:02 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x2, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:02 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 12) 10:29:02 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) 10:29:02 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x40981, 0x0) 10:29:02 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x4, 0x1, 0x2, 0x7, 0x35, @loopback, @private1, 0x1, 0x8718, 0x3, 0x9b8}}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000800)={&(0x7f0000000240)={0x5a8, 0x0, 0x300, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x1e0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r1}}, {0x8}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8}, {0x1a8, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x20}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x1a8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfc}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x4000}, 0x80) 10:29:02 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) [ 144.267345][T27936] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 144.275155][T27936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 144.282967][T27936] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 144.290788][T27936] 10:29:02 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x8, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:02 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x40981, 0x0) 10:29:02 executing program 4: process_vm_readv(0x0, 0x0, 0x63, 0x0, 0x20, 0x0) 10:29:02 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x4, 0x1, 0x2, 0x7, 0x35, @loopback, @private1, 0x1, 0x8718, 0x3, 0x9b8}}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000800)={&(0x7f0000000240)={0x5a8, 0x0, 0x300, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x1e0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r1}}, {0x8}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8}, {0x1a8, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x20}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x1a8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfc}}, {0x8}}}]}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x4000}, 0x80) 10:29:02 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x10, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) [ 144.316222][T27960] FAULT_INJECTION: forcing a failure. [ 144.316222][T27960] name failslab, interval 1, probability 0, space 0, times 0 [ 144.349338][T27960] CPU: 1 PID: 27960 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 144.359773][T27960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 144.369653][T27960] Call Trace: [ 144.372785][T27960] [ 144.375566][T27960] dump_stack_lvl+0x151/0x1b7 [ 144.380070][T27960] ? io_uring_drop_tctx_refs+0x190/0x190 [ 144.385536][T27960] ? slab_post_alloc_hook+0x53/0x2c0 [ 144.390658][T27960] ? copy_signal+0x55/0x610 [ 144.394997][T27960] ? copy_process+0x1274/0x3260 [ 144.399680][T27960] ? kernel_clone+0x21e/0x9e0 [ 144.404277][T27960] ? do_syscall_64+0x3d/0xb0 [ 144.408702][T27960] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 144.414606][T27960] dump_stack+0x15/0x17 [ 144.418596][T27960] should_fail+0x3c6/0x510 [ 144.422850][T27960] __should_failslab+0xa4/0xe0 [ 144.427448][T27960] ? dup_mm+0x95/0x12c0 [ 144.431445][T27960] should_failslab+0x9/0x20 [ 144.435785][T27960] slab_pre_alloc_hook+0x37/0xd0 [ 144.440558][T27960] ? dup_mm+0x95/0x12c0 [ 144.444548][T27960] kmem_cache_alloc+0x44/0x200 [ 144.449148][T27960] dup_mm+0x95/0x12c0 [ 144.452972][T27960] ? __kasan_check_write+0x14/0x20 [ 144.457912][T27960] ? copy_init_mm+0x20/0x20 [ 144.462252][T27960] copy_mm+0x107/0x1b0 [ 144.466160][T27960] copy_process+0x12bc/0x3260 [ 144.470673][T27960] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 144.475617][T27960] ? copy_clone_args_from_user+0x744/0x830 [ 144.481266][T27960] kernel_clone+0x21e/0x9e0 [ 144.485602][T27960] ? __delayed_free_task+0x20/0x20 [ 144.490547][T27960] ? vfs_write+0x9ec/0x1110 [ 144.494885][T27960] ? create_io_thread+0x1e0/0x1e0 [ 144.499751][T27960] __x64_sys_clone3+0x376/0x3a0 [ 144.504434][T27960] ? __ia32_sys_clone+0x290/0x290 [ 144.509300][T27960] ? fput+0x1a/0x20 [ 144.512939][T27960] ? debug_smp_processor_id+0x17/0x20 [ 144.518154][T27960] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 144.524047][T27960] ? exit_to_user_mode_prepare+0x39/0xa0 [ 144.529516][T27960] do_syscall_64+0x3d/0xb0 [ 144.533770][T27960] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 144.539497][T27960] RIP: 0033:0x7f52511e2ae9 [ 144.543751][T27960] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 10:29:03 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 13) 10:29:03 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) 10:29:03 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0, 0x2}], 0x2, 0x0) 10:29:03 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x10, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:03 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() syz_open_procfs$userns(r0, 0x0) syz_clone3(&(0x7f0000000680)={0x100100, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0, {0x8}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[r0], 0x1}, 0x58) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0), 0x4200, 0x0) process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000700)=""/97, 0x61}], 0x1, &(0x7f0000000500)=[{&(0x7f0000000280)=""/86, 0x56}, {&(0x7f0000000300)=""/161, 0xa1}, {&(0x7f0000000840)=""/228, 0xe4}, {&(0x7f0000000940)=""/200, 0xc8}, {&(0x7f00000000c0)=""/168, 0xa8}, {&(0x7f0000000b00)=""/172, 0xac}], 0x6, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000200)=0x19a) 10:29:03 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 10:29:03 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) [ 144.563281][T27960] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 144.571527][T27960] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 144.579423][T27960] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 144.587251][T27960] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 144.595044][T27960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 144.602855][T27960] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 144.610671][T27960] 10:29:03 executing program 1: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) 10:29:03 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x10, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:03 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0, 0x4000}], 0x2, 0x0) 10:29:03 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x10, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) [ 144.637880][T27993] FAULT_INJECTION: forcing a failure. [ 144.637880][T27993] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 144.655373][ T30] audit: type=1400 audit(1691922543.149:128): avc: denied { checkpoint_restore } for pid=27990 comm="syz-executor.5" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 10:29:03 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) [ 144.683710][T27993] CPU: 1 PID: 27993 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 144.693867][T27993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 144.703772][T27993] Call Trace: [ 144.706882][T27993] [ 144.709660][T27993] dump_stack_lvl+0x151/0x1b7 [ 144.714173][T27993] ? io_uring_drop_tctx_refs+0x190/0x190 [ 144.719644][T27993] ? __kasan_slab_alloc+0x63/0xe0 [ 144.724505][T27993] dump_stack+0x15/0x17 [ 144.728509][T27993] should_fail+0x3c6/0x510 [ 144.732751][T27993] should_fail_alloc_page+0x5a/0x80 [ 144.737781][T27993] prepare_alloc_pages+0x15c/0x700 [ 144.742727][T27993] ? __alloc_pages_bulk+0xf50/0xf50 [ 144.747776][T27993] __alloc_pages+0x138/0x5e0 [ 144.752192][T27993] ? zone_watermark_fast+0x220/0x220 [ 144.757308][T27993] ? __kasan_kmalloc+0x9/0x10 [ 144.761817][T27993] ? __kmalloc+0x13a/0x270 [ 144.766066][T27993] ? __vmalloc_node_range+0x2d6/0x8d0 [ 144.771276][T27993] __vmalloc_node_range+0x482/0x8d0 [ 144.776309][T27993] dup_task_struct+0x416/0xc60 [ 144.780911][T27993] ? copy_process+0x5c4/0x3260 [ 144.785516][T27993] ? __kasan_check_write+0x14/0x20 [ 144.790468][T27993] copy_process+0x5c4/0x3260 [ 144.794885][T27993] ? check_stack_object+0xf4/0x130 [ 144.799841][T27993] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 144.804884][T27993] ? copy_clone_args_from_user+0x744/0x830 [ 144.810536][T27993] kernel_clone+0x21e/0x9e0 [ 144.814845][T27993] ? __delayed_free_task+0x20/0x20 [ 144.819791][T27993] ? vfs_write+0x9ec/0x1110 [ 144.824132][T27993] ? create_io_thread+0x1e0/0x1e0 [ 144.828994][T27993] __x64_sys_clone3+0x376/0x3a0 [ 144.833682][T27993] ? __ia32_sys_clone+0x290/0x290 [ 144.838542][T27993] ? fput+0x1a/0x20 [ 144.842186][T27993] ? debug_smp_processor_id+0x17/0x20 [ 144.847390][T27993] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 144.853391][T27993] ? exit_to_user_mode_prepare+0x39/0xa0 [ 144.858856][T27993] do_syscall_64+0x3d/0xb0 [ 144.863101][T27993] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 144.868829][T27993] RIP: 0033:0x7f52511e2ae9 [ 144.873087][T27993] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 144.892533][T27993] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 144.900769][T27993] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 144.908577][T27993] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 144.916391][T27993] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 144.924201][T27993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:29:03 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 14) 10:29:03 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0, 0x3ffff}], 0x2, 0x0) 10:29:03 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() syz_open_procfs$userns(r0, 0x0) syz_clone3(&(0x7f0000000680)={0x100100, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0, {0x8}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[r0], 0x1}, 0x58) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0), 0x4200, 0x0) process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000700)=""/97, 0x61}], 0x1, &(0x7f0000000500)=[{&(0x7f0000000280)=""/86, 0x56}, {&(0x7f0000000300)=""/161, 0xa1}, {&(0x7f0000000840)=""/228, 0xe4}, {&(0x7f0000000940)=""/200, 0xc8}, {&(0x7f00000000c0)=""/168, 0xa8}, {&(0x7f0000000b00)=""/172, 0xac}], 0x6, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000200)=0x19a) (async) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000200)=0x19a) 10:29:03 executing program 1: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) 10:29:03 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:03 executing program 0: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() syz_open_procfs$userns(r0, 0x0) syz_clone3(&(0x7f0000000680)={0x100100, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0, {0x8}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[r0], 0x1}, 0x58) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0), 0x4200, 0x0) process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000700)=""/97, 0x61}], 0x1, &(0x7f0000000500)=[{&(0x7f0000000280)=""/86, 0x56}, {&(0x7f0000000300)=""/161, 0xa1}, {&(0x7f0000000840)=""/228, 0xe4}, {&(0x7f0000000940)=""/200, 0xc8}, {&(0x7f00000000c0)=""/168, 0xa8}, {&(0x7f0000000b00)=""/172, 0xac}], 0x6, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000200)=0x19a) 10:29:03 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0, 0x2000000}], 0x2, 0x0) 10:29:03 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:03 executing program 1: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) [ 144.932012][T27993] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 144.939825][T27993] [ 144.952752][T28010] FAULT_INJECTION: forcing a failure. [ 144.952752][T28010] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 144.974867][T28010] CPU: 1 PID: 28010 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 10:29:03 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() (async) r0 = getpid() syz_open_procfs$userns(r0, 0x0) syz_clone3(&(0x7f0000000680)={0x100100, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0, {0x8}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[r0], 0x1}, 0x58) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0), 0x4200, 0x0) process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000700)=""/97, 0x61}], 0x1, &(0x7f0000000500)=[{&(0x7f0000000280)=""/86, 0x56}, {&(0x7f0000000300)=""/161, 0xa1}, {&(0x7f0000000840)=""/228, 0xe4}, {&(0x7f0000000940)=""/200, 0xc8}, {&(0x7f00000000c0)=""/168, 0xa8}, {&(0x7f0000000b00)=""/172, 0xac}], 0x6, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000200)=0x19a) (async) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000200)=0x19a) 10:29:03 executing program 0: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() syz_open_procfs$userns(r0, 0x0) syz_clone3(&(0x7f0000000680)={0x100100, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0, {0x8}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[r0], 0x1}, 0x58) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0), 0x4200, 0x0) process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000700)=""/97, 0x61}], 0x1, &(0x7f0000000500)=[{&(0x7f0000000280)=""/86, 0x56}, {&(0x7f0000000300)=""/161, 0xa1}, {&(0x7f0000000840)=""/228, 0xe4}, {&(0x7f0000000940)=""/200, 0xc8}, {&(0x7f00000000c0)=""/168, 0xa8}, {&(0x7f0000000b00)=""/172, 0xac}], 0x6, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000200)=0x19a) [ 144.985023][T28010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 144.994919][T28010] Call Trace: [ 144.998042][T28010] [ 145.000821][T28010] dump_stack_lvl+0x151/0x1b7 [ 145.005335][T28010] ? io_uring_drop_tctx_refs+0x190/0x190 [ 145.010801][T28010] ? __kasan_slab_alloc+0x63/0xe0 [ 145.015662][T28010] dump_stack+0x15/0x17 [ 145.019655][T28010] should_fail+0x3c6/0x510 [ 145.023916][T28010] should_fail_alloc_page+0x5a/0x80 [ 145.028941][T28010] prepare_alloc_pages+0x15c/0x700 [ 145.033886][T28010] ? __alloc_pages_bulk+0xf50/0xf50 10:29:03 executing program 5: r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, 0x0, 0xfffffffffffffd71, 0x0, 0x0, 0x0) [ 145.038923][T28010] __alloc_pages+0x138/0x5e0 [ 145.043353][T28010] ? zone_watermark_fast+0x220/0x220 [ 145.048470][T28010] ? __kasan_kmalloc+0x9/0x10 [ 145.052983][T28010] ? __kmalloc+0x13a/0x270 [ 145.057236][T28010] ? __vmalloc_node_range+0x2d6/0x8d0 [ 145.062527][T28010] __vmalloc_node_range+0x482/0x8d0 [ 145.067576][T28010] dup_task_struct+0x416/0xc60 [ 145.072164][T28010] ? copy_process+0x5c4/0x3260 [ 145.076772][T28010] ? __kasan_check_write+0x14/0x20 [ 145.081724][T28010] copy_process+0x5c4/0x3260 [ 145.086141][T28010] ? check_stack_object+0xf4/0x130 [ 145.091083][T28010] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 145.096033][T28010] ? copy_clone_args_from_user+0x744/0x830 [ 145.101688][T28010] kernel_clone+0x21e/0x9e0 [ 145.106011][T28010] ? __delayed_free_task+0x20/0x20 [ 145.110957][T28010] ? vfs_write+0x9ec/0x1110 [ 145.115300][T28010] ? create_io_thread+0x1e0/0x1e0 [ 145.120157][T28010] __x64_sys_clone3+0x376/0x3a0 [ 145.124841][T28010] ? __ia32_sys_clone+0x290/0x290 [ 145.129700][T28010] ? fput+0x1a/0x20 [ 145.133346][T28010] ? debug_smp_processor_id+0x17/0x20 [ 145.138554][T28010] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 145.144453][T28010] ? exit_to_user_mode_prepare+0x39/0xa0 [ 145.149925][T28010] do_syscall_64+0x3d/0xb0 [ 145.154174][T28010] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 145.159907][T28010] RIP: 0033:0x7f52511e2ae9 [ 145.164158][T28010] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 10:29:03 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 15) 10:29:03 executing program 5: r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, 0x0, 0xfffffffffffffd71, 0x0, 0x0, 0x0) 10:29:03 executing program 0: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() syz_open_procfs$userns(r0, 0x0) syz_clone3(&(0x7f0000000680)={0x100100, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0, {0x8}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[r0], 0x1}, 0x58) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0), 0x4200, 0x0) process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000700)=""/97, 0x61}], 0x1, &(0x7f0000000500)=[{&(0x7f0000000280)=""/86, 0x56}, {&(0x7f0000000300)=""/161, 0xa1}, {&(0x7f0000000840)=""/228, 0xe4}, {&(0x7f0000000940)=""/200, 0xc8}, {&(0x7f00000000c0)=""/168, 0xa8}, {&(0x7f0000000b00)=""/172, 0xac}], 0x6, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000200)=0x19a) 10:29:03 executing program 1: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:29:03 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0, 0x40000000}], 0x2, 0x0) 10:29:03 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) [ 145.184031][T28010] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 145.192275][T28010] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 145.200085][T28010] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 145.207908][T28010] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 145.215710][T28010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 145.223521][T28010] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 145.231335][T28010] 10:29:03 executing program 5: r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, 0x0, 0xfffffffffffffd71, 0x0, 0x0, 0x0) 10:29:03 executing program 4: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:03 executing program 1: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) [ 145.244860][T28037] FAULT_INJECTION: forcing a failure. [ 145.244860][T28037] name failslab, interval 1, probability 0, space 0, times 0 [ 145.265832][T28037] CPU: 1 PID: 28037 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 145.275991][T28037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 145.285884][T28037] Call Trace: [ 145.289008][T28037] 10:29:03 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0, 0xffff0300}], 0x2, 0x0) 10:29:03 executing program 0: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() syz_open_procfs$userns(r0, 0x0) syz_clone3(&(0x7f0000000680)={0x100100, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0, {0x8}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[r0], 0x1}, 0x58) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0), 0x4200, 0x0) process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000700)=""/97, 0x61}], 0x1, &(0x7f0000000500)=[{&(0x7f0000000280)=""/86, 0x56}, {&(0x7f0000000300)=""/161, 0xa1}, {&(0x7f0000000840)=""/228, 0xe4}, {&(0x7f0000000940)=""/200, 0xc8}, {&(0x7f00000000c0)=""/168, 0xa8}, {&(0x7f0000000b00)=""/172, 0xac}], 0x6, 0x0) 10:29:03 executing program 0: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() syz_open_procfs$userns(r0, 0x0) syz_clone3(&(0x7f0000000680)={0x100100, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x8}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[r0], 0x1}, 0x58) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0), 0x4200, 0x0) [ 145.291782][T28037] dump_stack_lvl+0x151/0x1b7 [ 145.296297][T28037] ? io_uring_drop_tctx_refs+0x190/0x190 [ 145.301766][T28037] ? __alloc_pages+0x206/0x5e0 [ 145.306365][T28037] dump_stack+0x15/0x17 [ 145.310358][T28037] should_fail+0x3c6/0x510 [ 145.314612][T28037] __should_failslab+0xa4/0xe0 [ 145.319204][T28037] ? vm_area_dup+0x26/0x230 [ 145.323545][T28037] should_failslab+0x9/0x20 [ 145.327886][T28037] slab_pre_alloc_hook+0x37/0xd0 [ 145.332664][T28037] ? vm_area_dup+0x26/0x230 [ 145.337000][T28037] kmem_cache_alloc+0x44/0x200 [ 145.341604][T28037] vm_area_dup+0x26/0x230 [ 145.345764][T28037] dup_mm+0x81b/0x12c0 [ 145.349676][T28037] ? copy_init_mm+0x20/0x20 [ 145.354011][T28037] copy_mm+0x107/0x1b0 [ 145.357920][T28037] copy_process+0x12bc/0x3260 [ 145.362495][T28037] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 145.367381][T28037] ? copy_clone_args_from_user+0x744/0x830 [ 145.373019][T28037] kernel_clone+0x21e/0x9e0 [ 145.377360][T28037] ? __delayed_free_task+0x20/0x20 [ 145.382306][T28037] ? vfs_write+0x9ec/0x1110 [ 145.386652][T28037] ? create_io_thread+0x1e0/0x1e0 [ 145.391506][T28037] __x64_sys_clone3+0x376/0x3a0 [ 145.396194][T28037] ? __ia32_sys_clone+0x290/0x290 [ 145.401053][T28037] ? fput+0x1a/0x20 [ 145.404704][T28037] ? debug_smp_processor_id+0x17/0x20 [ 145.409909][T28037] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 145.415808][T28037] ? exit_to_user_mode_prepare+0x39/0xa0 [ 145.421277][T28037] do_syscall_64+0x3d/0xb0 [ 145.425527][T28037] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 145.431253][T28037] RIP: 0033:0x7f52511e2ae9 [ 145.435505][T28037] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 145.454946][T28037] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 145.463191][T28037] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 145.471003][T28037] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 145.478812][T28037] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 145.486631][T28037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:29:04 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 16) 10:29:04 executing program 0: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() syz_open_procfs$userns(r0, 0x0) syz_clone3(&(0x7f0000000680)={0x100100, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x8}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[r0], 0x1}, 0x58) 10:29:04 executing program 4: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:04 executing program 1: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:29:04 executing program 5: syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), 0xffffffffffffffff) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x882, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) getpgrp(0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x80, 0xf840, 0x20, 0x7, {{0xa, 0x4, 0x2, 0x3, 0x28, 0x68, 0x0, 0x2, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, {[@lsrr={0x83, 0x7, 0x1f, [@local]}, @end, @generic={0x83, 0xa, "efa72b0ac030b178"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x7, 0x8000, 0xfd0d, 0x1, {{0xa, 0x4, 0x1, 0x3, 0x28, 0x67, 0x0, 0x40, 0x2f, 0x0, @remote, @broadcast, {[@generic={0x83, 0x11, "b9bbacc89079dfd7a101a459b012ab"}]}}}}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000340)={'sit0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB='gre0\x00'/16, @ANYRES32=0x0, @ANYBLOB="008078000000800100000004480a002000660004dfbccb470636e849560d4744eb00082f906b0a0105026401"]}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000480)={'syztnl2\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x10, 0x8, 0x9, 0x1, {{0x2b, 0x4, 0x3, 0x2, 0xac, 0x66, 0x0, 0x4, 0x2f, 0x0, @empty, @rand_addr=0x64010101, {[@ra={0x94, 0x4, 0x1}, @timestamp={0x44, 0x14, 0x5c, 0x0, 0x0, [0xf800000, 0x3, 0x5, 0x80000001]}, @rr={0x7, 0x1b, 0xb4, [@multicast1, @private=0xa010102, @remote, @multicast1, @multicast2, @loopback]}, @cipso={0x86, 0x25, 0x0, [{0x0, 0xf, "1cd7b5ecdc41e307e2ad5bd9d1"}, {0x1, 0x5, "de9a36"}, {0x6, 0xb, "81c7f2eb7c53fbaaf7"}]}, @lsrr={0x83, 0xf, 0x7c, [@local, @multicast1, @broadcast]}, @timestamp_addr={0x44, 0xc, 0xff, 0x1, 0x4, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xe}]}, @rr={0x7, 0x17, 0x29, [@local, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast2]}, @ssrr={0x89, 0xb, 0xc, [@multicast2, @empty]}, @end]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'syztnl2\x00', &(0x7f0000000500)={'ip6_vti0\x00', 0x0, 0x2f, 0x5, 0x7, 0xd1, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @local, 0x0, 0x7800, 0x5, 0x5}}) r9 = open(&(0x7f0000000f00)='./file0\x00', 0x80, 0x96) syz_genetlink_get_family_id$ethtool(&(0x7f0000000ec0), r9) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000e80)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000e40)={&(0x7f00000005c0)={0x844, r1, 0x0, 0x70bd28, 0x25dfdbff, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r2}}}]}}, {{0x8, 0x1, r3}, {0x1a8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffa}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0xbc, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x503}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xffff}}, {0x8}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffd4a}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}]}}, {{0x8}, {0x88, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x214, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r7}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0xd0, 0xa8, 0x4, 0x2}, {0x5, 0x9, 0xf8, 0x9}, {0x40e4, 0x4, 0x1}, {0x514b, 0x0, 0x4b}, {0x2, 0x3, 0x61, 0x78}]}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xbf}}}]}}, {{0x8, 0x1, r8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0x844}, 0x1, 0x0, 0x0, 0x20000001}, 0x50) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000fc0)={'ip_vti0\x00', &(0x7f0000000f40)={'erspan0\x00', r8, 0x40, 0x700, 0x7ff, 0x9, {{0x11, 0x4, 0x1, 0x6, 0x44, 0x66, 0x0, 0x0, 0x29, 0x0, @local, @broadcast, {[@rr={0x7, 0x7, 0xaf, [@private=0xa010102]}, @lsrr={0x83, 0x27, 0xec, [@dev={0xac, 0x14, 0x14, 0xc}, @loopback, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x20}, @multicast1, @multicast1, @dev={0xac, 0x14, 0x14, 0x2c}, @broadcast]}]}}}}}) ioctl$BTRFS_IOC_TREE_SEARCH(r9, 0xd0009411, &(0x7f0000001000)={{0x0, 0x7, 0x0, 0xaf9, 0x4, 0x10000, 0x101, 0x0, 0xfffffff9, 0x884, 0xfffffffd, 0x10001, 0x8000000000000001, 0x8, 0x100}}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r9, 0xd000943e, &(0x7f0000002000)={0x0, r10, "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", "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"}) 10:29:04 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0, 0x200000000000000}], 0x2, 0x0) 10:29:04 executing program 1: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) [ 145.494610][T28037] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 145.502425][T28037] 10:29:04 executing program 0: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() syz_clone3(&(0x7f0000000680)={0x100100, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x8}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[r0], 0x1}, 0x58) 10:29:04 executing program 4: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) [ 145.538162][T28070] FAULT_INJECTION: forcing a failure. [ 145.538162][T28070] name failslab, interval 1, probability 0, space 0, times 0 [ 145.551239][T28070] CPU: 1 PID: 28070 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 145.561394][T28070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 145.571282][T28070] Call Trace: [ 145.574408][T28070] [ 145.577182][T28070] dump_stack_lvl+0x151/0x1b7 [ 145.581695][T28070] ? io_uring_drop_tctx_refs+0x190/0x190 [ 145.587162][T28070] ? avc_denied+0x1b0/0x1b0 [ 145.591503][T28070] dump_stack+0x15/0x17 [ 145.595495][T28070] should_fail+0x3c6/0x510 [ 145.599749][T28070] __should_failslab+0xa4/0xe0 [ 145.604346][T28070] ? vm_area_dup+0x26/0x230 [ 145.608687][T28070] should_failslab+0x9/0x20 [ 145.613021][T28070] slab_pre_alloc_hook+0x37/0xd0 [ 145.617800][T28070] ? vm_area_dup+0x26/0x230 [ 145.622138][T28070] kmem_cache_alloc+0x44/0x200 [ 145.626742][T28070] vm_area_dup+0x26/0x230 [ 145.630904][T28070] dup_mm+0x81b/0x12c0 [ 145.634825][T28070] ? copy_init_mm+0x20/0x20 [ 145.639150][T28070] copy_mm+0x107/0x1b0 [ 145.643057][T28070] copy_process+0x12bc/0x3260 [ 145.647569][T28070] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 145.652517][T28070] ? copy_clone_args_from_user+0x744/0x830 [ 145.658157][T28070] kernel_clone+0x21e/0x9e0 [ 145.662497][T28070] ? __delayed_free_task+0x20/0x20 [ 145.667441][T28070] ? vfs_write+0x9ec/0x1110 [ 145.671779][T28070] ? create_io_thread+0x1e0/0x1e0 [ 145.676645][T28070] __x64_sys_clone3+0x376/0x3a0 [ 145.681326][T28070] ? __ia32_sys_clone+0x290/0x290 [ 145.686189][T28070] ? fput+0x1a/0x20 [ 145.689923][T28070] ? debug_smp_processor_id+0x17/0x20 [ 145.695125][T28070] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 145.701028][T28070] ? exit_to_user_mode_prepare+0x39/0xa0 [ 145.706494][T28070] do_syscall_64+0x3d/0xb0 [ 145.710750][T28070] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 145.716475][T28070] RIP: 0033:0x7f52511e2ae9 [ 145.720729][T28070] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 145.740169][T28070] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 145.748414][T28070] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 145.756229][T28070] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 145.764036][T28070] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 145.771935][T28070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 145.779745][T28070] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 10:29:04 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:04 executing program 5: syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), 0xffffffffffffffff) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), 0xffffffffffffffff) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x882, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) getpgrp(0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x80, 0xf840, 0x20, 0x7, {{0xa, 0x4, 0x2, 0x3, 0x28, 0x68, 0x0, 0x2, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, {[@lsrr={0x83, 0x7, 0x1f, [@local]}, @end, @generic={0x83, 0xa, "efa72b0ac030b178"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x7, 0x8000, 0xfd0d, 0x1, {{0xa, 0x4, 0x1, 0x3, 0x28, 0x67, 0x0, 0x40, 0x2f, 0x0, @remote, @broadcast, {[@generic={0x83, 0x11, "b9bbacc89079dfd7a101a459b012ab"}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x7, 0x8000, 0xfd0d, 0x1, {{0xa, 0x4, 0x1, 0x3, 0x28, 0x67, 0x0, 0x40, 0x2f, 0x0, @remote, @broadcast, {[@generic={0x83, 0x11, "b9bbacc89079dfd7a101a459b012ab"}]}}}}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000340)={'sit0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB='gre0\x00'/16, @ANYRES32=0x0, @ANYBLOB="008078000000800100000004480a002000660004dfbccb470636e849560d4744eb00082f906b0a0105026401"]}) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000340)={'sit0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB='gre0\x00'/16, @ANYRES32=0x0, @ANYBLOB="008078000000800100000004480a002000660004dfbccb470636e849560d4744eb00082f906b0a0105026401"]}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000480)={'syztnl2\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x10, 0x8, 0x9, 0x1, {{0x2b, 0x4, 0x3, 0x2, 0xac, 0x66, 0x0, 0x4, 0x2f, 0x0, @empty, @rand_addr=0x64010101, {[@ra={0x94, 0x4, 0x1}, @timestamp={0x44, 0x14, 0x5c, 0x0, 0x0, [0xf800000, 0x3, 0x5, 0x80000001]}, @rr={0x7, 0x1b, 0xb4, [@multicast1, @private=0xa010102, @remote, @multicast1, @multicast2, @loopback]}, @cipso={0x86, 0x25, 0x0, [{0x0, 0xf, "1cd7b5ecdc41e307e2ad5bd9d1"}, {0x1, 0x5, "de9a36"}, {0x6, 0xb, "81c7f2eb7c53fbaaf7"}]}, @lsrr={0x83, 0xf, 0x7c, [@local, @multicast1, @broadcast]}, @timestamp_addr={0x44, 0xc, 0xff, 0x1, 0x4, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xe}]}, @rr={0x7, 0x17, 0x29, [@local, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast2]}, @ssrr={0x89, 0xb, 0xc, [@multicast2, @empty]}, @end]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'syztnl2\x00', &(0x7f0000000500)={'ip6_vti0\x00', 0x0, 0x2f, 0x5, 0x7, 0xd1, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @local, 0x0, 0x7800, 0x5, 0x5}}) r9 = open(&(0x7f0000000f00)='./file0\x00', 0x80, 0x96) syz_genetlink_get_family_id$ethtool(&(0x7f0000000ec0), r9) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000ec0), r9) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000e80)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000e40)={&(0x7f00000005c0)={0x844, r1, 0x0, 0x70bd28, 0x25dfdbff, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r2}}}]}}, {{0x8, 0x1, r3}, {0x1a8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffa}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0xbc, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x503}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xffff}}, {0x8}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffd4a}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}]}}, {{0x8}, {0x88, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x214, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r7}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0xd0, 0xa8, 0x4, 0x2}, {0x5, 0x9, 0xf8, 0x9}, {0x40e4, 0x4, 0x1}, {0x514b, 0x0, 0x4b}, {0x2, 0x3, 0x61, 0x78}]}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xbf}}}]}}, {{0x8, 0x1, r8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0x844}, 0x1, 0x0, 0x0, 0x20000001}, 0x50) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000fc0)={'ip_vti0\x00', &(0x7f0000000f40)={'erspan0\x00', r8, 0x40, 0x700, 0x7ff, 0x9, {{0x11, 0x4, 0x1, 0x6, 0x44, 0x66, 0x0, 0x0, 0x29, 0x0, @local, @broadcast, {[@rr={0x7, 0x7, 0xaf, [@private=0xa010102]}, @lsrr={0x83, 0x27, 0xec, [@dev={0xac, 0x14, 0x14, 0xc}, @loopback, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x20}, @multicast1, @multicast1, @dev={0xac, 0x14, 0x14, 0x2c}, @broadcast]}]}}}}}) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000fc0)={'ip_vti0\x00', &(0x7f0000000f40)={'erspan0\x00', r8, 0x40, 0x700, 0x7ff, 0x9, {{0x11, 0x4, 0x1, 0x6, 0x44, 0x66, 0x0, 0x0, 0x29, 0x0, @local, @broadcast, {[@rr={0x7, 0x7, 0xaf, [@private=0xa010102]}, @lsrr={0x83, 0x27, 0xec, [@dev={0xac, 0x14, 0x14, 0xc}, @loopback, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x20}, @multicast1, @multicast1, @dev={0xac, 0x14, 0x14, 0x2c}, @broadcast]}]}}}}}) ioctl$BTRFS_IOC_TREE_SEARCH(r9, 0xd0009411, &(0x7f0000001000)={{0x0, 0x7, 0x0, 0xaf9, 0x4, 0x10000, 0x101, 0x0, 0xfffffff9, 0x884, 0xfffffffd, 0x10001, 0x8000000000000001, 0x8, 0x100}}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r9, 0xd000943e, &(0x7f0000002000)={0x0, r10, "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", "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"}) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r9, 0xd000943e, &(0x7f0000002000)={0x0, r10, "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", "c64b3050f543823dccc8e04e9b8574e6b89fc7ef351dac63f89020435a680ce26ffe3e0c47768321d97d883c115e3a2845fb89384a22027b7226f0f97b09915a508ac26a0feb49d9cee8e66bc3e6214aa8fd925f7f299807185eff94a6d83e69cc955e4dd18d6112cb8d3de8ec9b266ba4f23eaff0d22a2781c1563fcbea67e32931f714d7107378fffa2f6ca806efedf38afbb29ddb35135892ce4d024d874870f2f4278cb5408e879b54a731cc1daddd5a333263a4b5769268f52c225c630b952666a0006b653c8efa058d499e5eae9c79d88cc713739153f211e11c066b081a865aa987ff65e3d2a318a5c5754497242eee14ccc3b875738d44b79905b2cb340b043eef8cd94e85490a5d9be82a76fc72762d0bc9f6989c28da9d8954f5e609811b465c63e8b663e757e8d26e65b7285708340bb148855e4f9c857315a8898a1da5bd468a142c29591af61d04edf9178df7bffedf3d3da4357fc21a3cc8fd149e5e6f727e8b5174ea21b00610a7a2b15ec7757f4031d7742aac16e46669296813785dd512865624492059b70678f902e75729bc80f24cd3ca488d3fee5007a327bcb5b2f0aa0d4af6c85e82de088f47ebd97676f86c17068060b3b5b78456b0765040b9964b907f706b41c1a86456f1282c6472401f80c43494795757db0cdcaa3eb5feb0b5f3ec026769e29e98ec7e0b8aada148bd2f1359fbf2dc23310ae29d7f9fb2cb16447d2d2282131fd07d21aaa03be3b7be4662aa7835b4edca0f105fc5cb361f6b65b29732ce2aa04fe9a50c8879509db313b29d95179d08629902e56a65e1c5e439cca0718fac24f1c11ecd75a808487f6641f6ee6a2f2e02b44447ddec03811d090584841a488f22809cdb8d938c1ee183e2952e7c1812f317a1f06a0fec03610a55fc66bd741f8fae25f14cc380d88ef97d15439c634961c884c45267140659c034ba350b736139f90435863bdf4bf7c26c4a8b6e36c147d524a638aa03d70b38a443684c4fdc232848ef264112e4becd51d5af372b288c8e88e83c0474e5b91e7af3a03c7f4644cf97d75ddb9134c30e85ba4f6ab669e708de73331762e1d645ca68012dbef9d10e6516cfe3436842a8ad735a44df772b66a3884aa1a648f44c416738c2d3129b6689e9eb8ddea9b1be58c4794ed595a86a7000b50f79b68086b6cb435a8ce19f87c8f0f936299a3a58c710570a945fef26cd230b6434e19704af4c5389535aa4ff26bb75e9b6f91aba31e0220d6e3e752b02b721e9f775d5446a3a7e01ea7eca1b6eaa2476c03488c05af182dad31da919cbcaaf924d9405b753970b61a0504278557b8351475143fdf6b37d50473b5e4d9763a5f9ba6a9c6cad8efb927fde64f933ec1cb7ea35af7f62515a4db3b8058b3cc14cfb54993ae216722f673ea4218e76e011f98466318de9c381e02bd04de7f6538d10cb3b420e054d18d148bff82ef3b7eaaa0fcff8ddc52a1cb6e442508185b656897a8ff9c11819b41bed43cd1c8ed0edbce2c5c9b881d5e18f19af1f7811c79fea3d949c9dc1c02d5bed6e812776faad575836e594dfb1bd1f7ebdec82244790ac023fdeb885e9936a2965dc11d06e5eef1cf328f9af288108771d69b55eec86ab08215fcd5164ae4caebd271b388a317287aa8887e200511b094d17cc00d810063ca46e5560cb812efec4dec7e64073b7dbccfb47ad41023b8fa30487c0336786d3645a48827bcdc6df6abcfa2824f731189bee7f01db0a13a472f505e99efb08ba4c40057cc90ecf6d43672b7d8884ccd4e392b7f7590e92b09f6ca653c84726ffdd2766471fcef44164c9521d7d8f6c5bc3feae5891bc4f9390941dd42c62ee811a079d212e776b92076b9971acf8696d385c4b97c851df437ad15505cbd461a29be444ac221260d55e7eb64f6ea3301e01a32258102ae4c4d5775f9aa91210392e7cb0fce1de7b1850cc5298f42bd41544e88c2be02e72e255cb80991a10053811406961e7ea551b1384f29f49796555b9e0b891cab384e25728971bee9aaa2808303e52265addfca9d5dfbdfa0f39a076fc3566b7d5168eeeeaacebf2a5a89872d1ab9301cb569533a22b42361c1d80ed1e8c28a5883c045595beb24a0eeea6ede059b97fdcf5916e8e63b00e14bc3d430d9af7fea3e1ec165c32f62c1bd161d99ae54f03baafe2f217c221d7198e7743db1e1ac56f16309fb160b5c27649d7f830ab3c53233b2df789c809f0e34c23319a69ee7b7c2b239893a75abda74c02a71b73bdc62f8f836508473617c459c8d329ce072d023e3123467409dc7e6f6c6010a86f70e273a4bd036b17855321df320b42db1897c3be68d25208ee7da6640e0500a5e0fb1cb5af715a5086d7f2cb01c9c13f427604043a8b96ba3e34b7f9f257a178bf25a0f2637e9e92c945f2e10e9c10f00f45d99be92bf9274da711797f2f821ff922fe7b6affbb1a49e1c29cc06c80d3150a4274ffe90117c8e2253fdfba70f0d7f236fa2c70ce48e4bc96992f75c2590a9be643a93a8f3cc0145060ab986d65782da1a6cbde43736ae3f69e5d214827513f4a53e779d8f5895eecf3d28b5e99e88b4f80ec9ada85adf48ee4c67731874667c8ae22fc726605f99e9963361632fd4be96e8bc4102fde8a7c30945f12cdcc58e02ef00b5c107d3dc437f03a71edd52244a2fa7663f29849da326a0e683a2bc0750338dad8977973d53ce6d02c7052842aca290243fe0158eadec0599dc9f6c03f968705772525e8798eb04576e351a34c6283f0db055d6f53b89d14afb1a3a3ea7669c31947a4d97f215ebe99f1cf8b5e29683bc4ee5321bc56610b5a624d6b045347ea98d62a4f19d3dc2ace68be6a2556f8f2884b912d37df1f974c3aa35cd48e22c38cbce38fe59ec96dc7e8b4e8978f1889f8894bfab4c75de0fe253a8ebb8f9177c93519127c697008b44af2a7d47ef613bc0e12a7deda125eb403212490a416aa4d24949b9b7cc41f30b1643cf9363c86ad807bc136e1a6fd2d15d5de3700cabdba3d4ab0eb56cb7aae16887c3bd246b32c332a0cb507130e54365dec53e4545a2c2668e120d262154bbc5e67ed6c8c01e4c97bc69606d750bea8ed7ea8c35dd15c01a64e5a92f9341763f88543a49fcf3b8eea7fb04db77e4ca4e68fd470a9f8f9b883ccdbb3c8468320941648a77ad5db9f9bc6b9b12ca099b289924ac7fbba44b26cf986ca5b62b13b5e6a20b4c5a23b1fad1d1a1b9d9e6911dfc36f5fe18facc77f48272936c0100c60444f380dc1565502d571f43bda5ed72e8d8381bb12b145305c7334f7e0fff848390a268f4c921317dbae3dd5f0dcca54351bd467f72a84f038e6bd95824f8cf6581ebc15e4f332e12a34caf187793b4d4a7fa271cbc26d95cc21e17a1463a642778402df0e312421414f487713a10055d2cf224c1ea9b69117ff879271a73cc2ac6d407f2fe0d91bf6c6e649949d922426151069ff68e9c21960fa3ded82bbf3d7ec33876e013a8b227eeff20c02e4bcd8b434b0fbdfb9ccaeb6a087286c22c72b32cfe70dea92015eff45c23180afe00a1a8082526c541270029f815911ec36b45d74c93eb9450b57d84724f92ba7fb9d00a8ba3dc8610727accb601381bbb42b25f34fbc940a36d200c43de572b3b04bbbb9fb2609fa2f81f7cfb2d5cc2d638cb7ebbc7f000467edb2d53f52424d634c8d51112822bd6331ae8b67a3599a35798b14c6ef42bbb228170555e2bdf3e8cae64180a1a1d7c1c6c8fe38b96f2e23e5da972c69550d674a947fc2793a9d34fe07157aa8444a379daabf512c5e94a72a50c535082dbb5d70f111e64775c960525183ebcd537475b6738a06794601ce1d5c52961680e4aaf9fb07f86a02589a2bd7b7f041ab4ceb77794969a0228a60f7abfae7dc2f09c681b5caafdc5fca0e1a10872a133352732230625b0eeede17ce76a782671ce81ba977daf04002fe6ade77bb45253f609365ead27b3b5c242d3f429f77f5cbb2e0b8746349acb8684a899ccfeb497518d71186c90ac10606caf8f2358ed6c5a4c0e832236f4c8755bfad53b2a600326dfdedb70e37f08da0b7840153f34d47d0da7d4d4b29d1b4385da5d86ca373b7c204da514dc665ee1d373702f302d6f7a3ac32bb04d996919dbca76695aaddaf866adb7e8b5fc27182d73e2496620dbc5c25e6db7fb02df6b2c9c3feb8bc608d1df3432e869435d36c217f0e6768deff359ea981641180b5934b4ec0ce1e588415b0ccda751b5b1145d01f2eb6c52266cc8d3ac0f05d0ba0785d2f1af8199193c021c509483b561821767b5b8fb70aed4f493a0879f7f8a013042ddee0a6ea51df017ba3b4c772fcf6d55711fe294660cb831155dcde7e1f18fde173f29b57af98609759fc8cb6cf7f937d5984dcd5db7676d75649fb8b71e610e4797588fb2bd815c388b47d8038bd091d221df15f453dc4d634dc076398883eb82cbb90bbae4ff78749ad5fab8c696483982829387eed95059e8f3338189e69f2f0fe1a0bd12624a3026dd9a5c3f42a73932215abe116731db0bddda20fd4cf649035bf84ca1f8dd471432309c82b2c55d7c5a8ff1c3f450b4983695128bc3608c08e080ab5c1fc67a8b91e81aed97825e6ed387366ec5f454c9cee56f94543d735a85f0a6c9d6a37fa111cbb9f48a2aef44f00464df03112d7f090b11f7973c8ff465c0b7f6206bcc50ff33ef96e31617f75f727cefcd8fc829c1fcacb9621ad0e023fd5924b42fc5bbe7d0108800fa9dc5bcfca617519166108d8ec80dd9aa305839710284f98a639b157ea6988b5878bfbdda4e346818c9e78f4807fa39c80d8674231c0d9a2aea8b0176488c5c78058a3b15b6e8f086cea935a1713d7f3005283719f5055fe1bcea950393ee3975b287ed4e0af920f57c771ba60fb83a27e263a224718df042a2ce8ae6a43c759d0b884820755a59dda1f9a14d84125d005c27b385fc1201997590fe9576f60f439fcc36500ad62f4b76b8150af1f6b80debb90cae7f9d0c7ded0ab5e5fd8d184686e97b61b66918345b7aa3f126e690ca066b1b08e6441345f996c26641d41f9822f68255c401d0c8721d78fa8d144bcf1309dce7b3c7fc8b3719ef730109bb65063d424a6a11f8603ecb8ca1e7966af29a1f5ec628b823b235f9d5ef10df759f533bc8e845f7189a11f31a9f7fd6eb5946832e62e83e4c2254066ebf07654faae7f01ada3fc43ebf78a872e377c86a73b73f3fb61f4cf27626877492997a7544c842e584c15c62c5465ca34c2204fc810d1b07a00b8c556970b45f2f21e04a1c49b179a6884dcb53806344c46f38180858c484031564c2ce6887f45a041a5a9692debb3b64c5625b8268c4702f6d853e43717ce3627d106f625452714a449de1401d03bacfe"}) 10:29:04 executing program 0: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000000680)={0x100100, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x8}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[0x0], 0x1}, 0x58) 10:29:04 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 17) 10:29:04 executing program 0: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000000680)={0x100100, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x8}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[0x0], 0x1}, 0x58) 10:29:04 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:04 executing program 5: syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), 0xffffffffffffffff) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x882, 0x0) (async) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) getpgrp(0x0) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x80, 0xf840, 0x20, 0x7, {{0xa, 0x4, 0x2, 0x3, 0x28, 0x68, 0x0, 0x2, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, {[@lsrr={0x83, 0x7, 0x1f, [@local]}, @end, @generic={0x83, 0xa, "efa72b0ac030b178"}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x7, 0x8000, 0xfd0d, 0x1, {{0xa, 0x4, 0x1, 0x3, 0x28, 0x67, 0x0, 0x40, 0x2f, 0x0, @remote, @broadcast, {[@generic={0x83, 0x11, "b9bbacc89079dfd7a101a459b012ab"}]}}}}}) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000340)={'sit0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB='gre0\x00'/16, @ANYRES32=0x0, @ANYBLOB="008078000000800100000004480a002000660004dfbccb470636e849560d4744eb00082f906b0a0105026401"]}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000480)={'syztnl2\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x10, 0x8, 0x9, 0x1, {{0x2b, 0x4, 0x3, 0x2, 0xac, 0x66, 0x0, 0x4, 0x2f, 0x0, @empty, @rand_addr=0x64010101, {[@ra={0x94, 0x4, 0x1}, @timestamp={0x44, 0x14, 0x5c, 0x0, 0x0, [0xf800000, 0x3, 0x5, 0x80000001]}, @rr={0x7, 0x1b, 0xb4, [@multicast1, @private=0xa010102, @remote, @multicast1, @multicast2, @loopback]}, @cipso={0x86, 0x25, 0x0, [{0x0, 0xf, "1cd7b5ecdc41e307e2ad5bd9d1"}, {0x1, 0x5, "de9a36"}, {0x6, 0xb, "81c7f2eb7c53fbaaf7"}]}, @lsrr={0x83, 0xf, 0x7c, [@local, @multicast1, @broadcast]}, @timestamp_addr={0x44, 0xc, 0xff, 0x1, 0x4, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xe}]}, @rr={0x7, 0x17, 0x29, [@local, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast2]}, @ssrr={0x89, 0xb, 0xc, [@multicast2, @empty]}, @end]}}}}}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'batadv0\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'syztnl2\x00', &(0x7f0000000500)={'ip6_vti0\x00', 0x0, 0x2f, 0x5, 0x7, 0xd1, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @local, 0x0, 0x7800, 0x5, 0x5}}) r9 = open(&(0x7f0000000f00)='./file0\x00', 0x80, 0x96) syz_genetlink_get_family_id$ethtool(&(0x7f0000000ec0), r9) (async) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000e80)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000e40)={&(0x7f00000005c0)={0x844, r1, 0x0, 0x70bd28, 0x25dfdbff, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r2}}}]}}, {{0x8, 0x1, r3}, {0x1a8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffa}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0xbc, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x503}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xffff}}, {0x8}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffd4a}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}]}}, {{0x8}, {0x88, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x214, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r7}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0xd0, 0xa8, 0x4, 0x2}, {0x5, 0x9, 0xf8, 0x9}, {0x40e4, 0x4, 0x1}, {0x514b, 0x0, 0x4b}, {0x2, 0x3, 0x61, 0x78}]}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xbf}}}]}}, {{0x8, 0x1, r8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0x844}, 0x1, 0x0, 0x0, 0x20000001}, 0x50) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000fc0)={'ip_vti0\x00', &(0x7f0000000f40)={'erspan0\x00', r8, 0x40, 0x700, 0x7ff, 0x9, {{0x11, 0x4, 0x1, 0x6, 0x44, 0x66, 0x0, 0x0, 0x29, 0x0, @local, @broadcast, {[@rr={0x7, 0x7, 0xaf, [@private=0xa010102]}, @lsrr={0x83, 0x27, 0xec, [@dev={0xac, 0x14, 0x14, 0xc}, @loopback, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x20}, @multicast1, @multicast1, @dev={0xac, 0x14, 0x14, 0x2c}, @broadcast]}]}}}}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r9, 0xd0009411, &(0x7f0000001000)={{0x0, 0x7, 0x0, 0xaf9, 0x4, 0x10000, 0x101, 0x0, 0xfffffff9, 0x884, 0xfffffffd, 0x10001, 0x8000000000000001, 0x8, 0x100}}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r9, 0xd000943e, &(0x7f0000002000)={0x0, r10, "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", "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"}) 10:29:04 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0, 0x4000000000000000}], 0x2, 0x0) 10:29:04 executing program 1: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:29:04 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0, 0xffff030000000000}], 0x2, 0x0) [ 145.787564][T28070] 10:29:04 executing program 1: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:29:04 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000700000004000000014c0e0030006700000129907800000000640101004418633000000002000000030000001000df2cf4fffffff99404010056155bb3f576cb249e987ee8c1218fc30c2f00cc812b2a45eba0cae04cbe079739e6d6ad9d062bdd0cb0431ece34145bd2c427390a631ce98d9d30413b9e4fad910c12b6120536da528cbd53bd5705d53df49bd678ce6c1355bac812a16831d4ce500703f9c55d4cad60f1450919365ea693c288172bf6"]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:04 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:04 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x8, 0x0) 10:29:04 executing program 0: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000000680)={0x100100, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x8}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[0x0], 0x1}, 0x58) [ 145.815963][T28096] FAULT_INJECTION: forcing a failure. [ 145.815963][T28096] name failslab, interval 1, probability 0, space 0, times 0 [ 145.858033][T28096] CPU: 1 PID: 28096 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 145.868193][T28096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 145.878095][T28096] Call Trace: [ 145.881212][T28096] [ 145.883990][T28096] dump_stack_lvl+0x151/0x1b7 [ 145.888500][T28096] ? io_uring_drop_tctx_refs+0x190/0x190 [ 145.893965][T28096] dump_stack+0x15/0x17 [ 145.897956][T28096] should_fail+0x3c6/0x510 [ 145.902208][T28096] __should_failslab+0xa4/0xe0 [ 145.906809][T28096] ? prepare_creds+0x2f/0x6a0 [ 145.911321][T28096] should_failslab+0x9/0x20 [ 145.915660][T28096] slab_pre_alloc_hook+0x37/0xd0 [ 145.920436][T28096] ? prepare_creds+0x2f/0x6a0 [ 145.924949][T28096] kmem_cache_alloc+0x44/0x200 [ 145.929548][T28096] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 145.934843][T28096] prepare_creds+0x2f/0x6a0 [ 145.939183][T28096] copy_creds+0xf0/0x630 [ 145.943260][T28096] ? dup_task_struct+0x7e6/0xc60 [ 145.948035][T28096] copy_process+0x7c3/0x3260 [ 145.952464][T28096] ? check_stack_object+0xf4/0x130 [ 145.957500][T28096] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 145.962441][T28096] ? copy_clone_args_from_user+0x744/0x830 [ 145.968086][T28096] kernel_clone+0x21e/0x9e0 [ 145.972424][T28096] ? __delayed_free_task+0x20/0x20 [ 145.977368][T28096] ? vfs_write+0x9ec/0x1110 [ 145.981709][T28096] ? create_io_thread+0x1e0/0x1e0 [ 145.986570][T28096] __x64_sys_clone3+0x376/0x3a0 [ 145.991259][T28096] ? __ia32_sys_clone+0x290/0x290 [ 145.996116][T28096] ? fput+0x1a/0x20 [ 145.999765][T28096] ? debug_smp_processor_id+0x17/0x20 [ 146.004969][T28096] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 146.010873][T28096] ? exit_to_user_mode_prepare+0x39/0xa0 [ 146.016340][T28096] do_syscall_64+0x3d/0xb0 [ 146.020592][T28096] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 146.026320][T28096] RIP: 0033:0x7f52511e2ae9 [ 146.030580][T28096] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 146.050016][T28096] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 10:29:04 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 18) 10:29:04 executing program 1: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:29:04 executing program 0: r0 = getpid() syz_clone3(&(0x7f0000000680)={0x100100, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x8}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[r0], 0x1}, 0x58) 10:29:04 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000700000004000000014c0e0030006700000129907800000000640101004418633000000002000000030000001000df2cf4fffffff99404010056155bb3f576cb249e987ee8c1218fc30c2f00cc812b2a45eba0cae04cbe079739e6d6ad9d062bdd0cb0431ece34145bd2c427390a631ce98d9d30413b9e4fad910c12b6120536da528cbd53bd5705d53df49bd678ce6c1355bac812a16831d4ce500703f9c55d4cad60f1450919365ea693c288172bf6"]}) (async, rerun: 64) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) 10:29:04 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x2) 10:29:04 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:29:04 executing program 1: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) [ 146.058259][T28096] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 146.066156][T28096] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 146.073968][T28096] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 146.081779][T28096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 146.089593][T28096] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 146.097412][T28096] 10:29:04 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000700000004000000014c0e0030006700000129907800000000640101004418633000000002000000030000001000df2cf4fffffff99404010056155bb3f576cb249e987ee8c1218fc30c2f00cc812b2a45eba0cae04cbe079739e6d6ad9d062bdd0cb0431ece34145bd2c427390a631ce98d9d30413b9e4fad910c12b6120536da528cbd53bd5705d53df49bd678ce6c1355bac812a16831d4ce500703f9c55d4cad60f1450919365ea693c288172bf6"]}) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:04 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x4000) 10:29:04 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:29:04 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) [ 146.123573][T28125] FAULT_INJECTION: forcing a failure. [ 146.123573][T28125] name failslab, interval 1, probability 0, space 0, times 0 [ 146.139241][T28125] CPU: 1 PID: 28125 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 146.149399][T28125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 146.159381][T28125] Call Trace: [ 146.162506][T28125] [ 146.165291][T28125] dump_stack_lvl+0x151/0x1b7 10:29:04 executing program 0: getpid() syz_clone3(0x0, 0x0) [ 146.169795][T28125] ? io_uring_drop_tctx_refs+0x190/0x190 [ 146.175264][T28125] dump_stack+0x15/0x17 [ 146.179251][T28125] should_fail+0x3c6/0x510 [ 146.183508][T28125] __should_failslab+0xa4/0xe0 [ 146.188108][T28125] should_failslab+0x9/0x20 [ 146.192445][T28125] slab_pre_alloc_hook+0x37/0xd0 [ 146.197220][T28125] __kmalloc+0x6d/0x270 [ 146.201211][T28125] ? prepare_creds+0x2f/0x6a0 [ 146.205724][T28125] ? security_prepare_creds+0x4d/0x140 [ 146.211117][T28125] security_prepare_creds+0x4d/0x140 [ 146.216313][T28125] prepare_creds+0x472/0x6a0 [ 146.220740][T28125] copy_creds+0xf0/0x630 [ 146.224821][T28125] ? dup_task_struct+0x7e6/0xc60 [ 146.229596][T28125] copy_process+0x7c3/0x3260 [ 146.234019][T28125] ? check_stack_object+0xf4/0x130 [ 146.238976][T28125] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 146.243918][T28125] ? copy_clone_args_from_user+0x744/0x830 [ 146.249554][T28125] kernel_clone+0x21e/0x9e0 [ 146.253898][T28125] ? __delayed_free_task+0x20/0x20 [ 146.258841][T28125] ? vfs_write+0x9ec/0x1110 [ 146.263183][T28125] ? create_io_thread+0x1e0/0x1e0 [ 146.268036][T28125] __x64_sys_clone3+0x376/0x3a0 [ 146.272722][T28125] ? __ia32_sys_clone+0x290/0x290 [ 146.277583][T28125] ? fput+0x1a/0x20 [ 146.281230][T28125] ? debug_smp_processor_id+0x17/0x20 [ 146.286437][T28125] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 146.292338][T28125] ? exit_to_user_mode_prepare+0x39/0xa0 [ 146.297808][T28125] do_syscall_64+0x3d/0xb0 [ 146.302060][T28125] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 146.307872][T28125] RIP: 0033:0x7f52511e2ae9 [ 146.312126][T28125] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 146.331567][T28125] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 146.339812][T28125] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 146.347624][T28125] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 146.355436][T28125] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 146.363246][T28125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:29:04 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 19) 10:29:04 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}], 0x1, 0x0) 10:29:04 executing program 0: getpid() syz_clone3(0x0, 0x0) 10:29:04 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) syz_clone3(&(0x7f0000000300)={0x8000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[r1, r0, r1, r1, r1, r0, r0], 0x7}, 0x58) r2 = getpid() process_vm_readv(r2, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x8000}, 0x8) 10:29:04 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x3ffff) 10:29:04 executing program 1: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) [ 146.371057][T28125] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 146.378871][T28125] [ 146.391730][T28143] FAULT_INJECTION: forcing a failure. [ 146.391730][T28143] name failslab, interval 1, probability 0, space 0, times 0 [ 146.408978][T28143] CPU: 0 PID: 28143 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 146.419140][T28143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 146.429024][T28143] Call Trace: [ 146.432145][T28143] [ 146.434927][T28143] dump_stack_lvl+0x151/0x1b7 [ 146.439439][T28143] ? io_uring_drop_tctx_refs+0x190/0x190 [ 146.444907][T28143] ? avc_has_perm_noaudit+0x348/0x430 [ 146.450112][T28143] dump_stack+0x15/0x17 [ 146.454119][T28143] should_fail+0x3c6/0x510 [ 146.458451][T28143] __should_failslab+0xa4/0xe0 [ 146.463045][T28143] ? dup_fd+0x72/0xb00 [ 146.466949][T28143] should_failslab+0x9/0x20 [ 146.471288][T28143] slab_pre_alloc_hook+0x37/0xd0 [ 146.476062][T28143] ? dup_fd+0x72/0xb00 [ 146.479966][T28143] kmem_cache_alloc+0x44/0x200 [ 146.484568][T28143] dup_fd+0x72/0xb00 [ 146.488299][T28143] ? avc_has_perm+0x16f/0x260 [ 146.492815][T28143] ? avc_has_perm_noaudit+0x430/0x430 [ 146.498022][T28143] copy_files+0xe6/0x200 [ 146.502104][T28143] ? perf_event_attrs+0x30/0x30 [ 146.506788][T28143] ? dup_task_struct+0xc60/0xc60 [ 146.511561][T28143] ? security_task_alloc+0xf9/0x130 [ 146.516596][T28143] copy_process+0x11f3/0x3260 [ 146.521111][T28143] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 146.526054][T28143] ? copy_clone_args_from_user+0x744/0x830 [ 146.531698][T28143] kernel_clone+0x21e/0x9e0 [ 146.536034][T28143] ? __delayed_free_task+0x20/0x20 [ 146.540986][T28143] ? vfs_write+0x9ec/0x1110 [ 146.545410][T28143] ? create_io_thread+0x1e0/0x1e0 [ 146.550452][T28143] __x64_sys_clone3+0x376/0x3a0 [ 146.555129][T28143] ? __ia32_sys_clone+0x290/0x290 [ 146.559989][T28143] ? fput+0x1a/0x20 [ 146.563647][T28143] ? debug_smp_processor_id+0x17/0x20 [ 146.568840][T28143] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 146.574744][T28143] ? exit_to_user_mode_prepare+0x39/0xa0 [ 146.580385][T28143] do_syscall_64+0x3d/0xb0 [ 146.584641][T28143] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 146.590368][T28143] RIP: 0033:0x7f52511e2ae9 [ 146.594618][T28143] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 146.614070][T28143] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 10:29:05 executing program 0: getpid() syz_clone3(0x0, 0x0) 10:29:05 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}], 0x1, 0x0) 10:29:05 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) (async) r1 = getpid() syz_open_procfs$userns(r1, 0x0) (async) syz_clone3(&(0x7f0000000300)={0x8000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[r1, r0, r1, r1, r1, r0, r0], 0x7}, 0x58) (async) r2 = getpid() process_vm_readv(r2, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x8000}, 0x8) 10:29:05 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x2000000) 10:29:05 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}], 0x1, 0x0) 10:29:05 executing program 1: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) syz_clone3(&(0x7f0000000300)={0x8000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[r1, r0, r1, r1, r1, r0, r0], 0x7}, 0x58) r2 = getpid() process_vm_readv(r2, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x8000}, 0x8) 10:29:05 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 20) 10:29:05 executing program 0: r0 = getpid() syz_clone3(&(0x7f0000000680)={0x0, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x8}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[r0], 0x1}, 0x58) [ 146.622393][T28143] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 146.630209][T28143] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 146.638024][T28143] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 146.645916][T28143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 146.653722][T28143] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 146.661540][T28143] 10:29:05 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:29:05 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x40000000) 10:29:05 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) (async) r1 = getpid() syz_open_procfs$userns(r1, 0x0) (async) syz_clone3(&(0x7f0000000300)={0x8000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[r1, r0, r1, r1, r1, r0, r0], 0x7}, 0x58) (async) r2 = getpid() process_vm_readv(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x8000}, 0x8) 10:29:05 executing program 0: r0 = getpid() syz_clone3(&(0x7f0000000680)={0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480), {0x8}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[r0], 0x1}, 0x58) 10:29:05 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:29:05 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0xffff0300) 10:29:05 executing program 1: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) syz_clone3(&(0x7f0000000300)={0x8000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[r1, r0, r1, r1, r1, r0, r0], 0x7}, 0x58) r2 = getpid() process_vm_readv(r2, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x8000}, 0x8) [ 146.736481][T28168] FAULT_INJECTION: forcing a failure. [ 146.736481][T28168] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 146.763901][T28168] CPU: 0 PID: 28168 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 146.774059][T28168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 10:29:05 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x200000000000000) 10:29:05 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:29:05 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x4000000000000000) [ 146.783961][T28168] Call Trace: [ 146.787076][T28168] [ 146.789857][T28168] dump_stack_lvl+0x151/0x1b7 [ 146.794365][T28168] ? io_uring_drop_tctx_refs+0x190/0x190 [ 146.799838][T28168] ? stack_trace_save+0x113/0x1c0 [ 146.804699][T28168] dump_stack+0x15/0x17 [ 146.808688][T28168] should_fail+0x3c6/0x510 [ 146.812941][T28168] should_fail_alloc_page+0x5a/0x80 [ 146.817973][T28168] prepare_alloc_pages+0x15c/0x700 [ 146.823012][T28168] ? __alloc_pages_bulk+0xf50/0xf50 [ 146.828042][T28168] __alloc_pages+0x138/0x5e0 [ 146.832467][T28168] ? stack_trace_save+0x1c0/0x1c0 [ 146.837328][T28168] ? zone_watermark_fast+0x220/0x220 [ 146.842473][T28168] get_zeroed_page+0x19/0x40 [ 146.846873][T28168] __pud_alloc+0x8b/0x260 [ 146.851045][T28168] ? stack_trace_snprint+0xf0/0xf0 [ 146.856004][T28168] ? do_handle_mm_fault+0x2330/0x2330 [ 146.861195][T28168] ? __stack_depot_save+0x34/0x470 [ 146.866136][T28168] ? anon_vma_clone+0x9a/0x500 [ 146.870737][T28168] copy_page_range+0x2bcf/0x2f90 [ 146.875514][T28168] ? __kasan_slab_alloc+0xb1/0xe0 [ 146.880368][T28168] ? slab_post_alloc_hook+0x53/0x2c0 [ 146.885492][T28168] ? dup_mm+0x8c5/0x12c0 [ 146.889570][T28168] ? copy_mm+0x107/0x1b0 [ 146.893647][T28168] ? copy_process+0x12bc/0x3260 [ 146.898337][T28168] ? kernel_clone+0x21e/0x9e0 [ 146.902849][T28168] ? __x64_sys_clone3+0x376/0x3a0 [ 146.907711][T28168] ? do_syscall_64+0x3d/0xb0 [ 146.912136][T28168] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 146.918041][T28168] ? pfn_valid+0x1e0/0x1e0 [ 146.922291][T28168] ? rwsem_write_trylock+0x15b/0x290 [ 146.927408][T28168] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 146.933668][T28168] dup_mm+0xadc/0x12c0 [ 146.937566][T28168] ? copy_init_mm+0x20/0x20 [ 146.941906][T28168] copy_mm+0x107/0x1b0 [ 146.945809][T28168] copy_process+0x12bc/0x3260 [ 146.950326][T28168] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 146.955275][T28168] ? copy_clone_args_from_user+0x744/0x830 [ 146.961000][T28168] kernel_clone+0x21e/0x9e0 [ 146.965339][T28168] ? __delayed_free_task+0x20/0x20 [ 146.970285][T28168] ? vfs_write+0x9ec/0x1110 [ 146.974631][T28168] ? create_io_thread+0x1e0/0x1e0 [ 146.979489][T28168] __x64_sys_clone3+0x376/0x3a0 [ 146.984172][T28168] ? __ia32_sys_clone+0x290/0x290 [ 146.989554][T28168] ? fput+0x1a/0x20 [ 146.993205][T28168] ? debug_smp_processor_id+0x17/0x20 [ 146.998407][T28168] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 147.004307][T28168] ? exit_to_user_mode_prepare+0x39/0xa0 [ 147.009776][T28168] do_syscall_64+0x3d/0xb0 [ 147.014027][T28168] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 147.019759][T28168] RIP: 0033:0x7f52511e2ae9 [ 147.024013][T28168] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 147.043452][T28168] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 147.051783][T28168] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 147.059594][T28168] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 147.067404][T28168] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 147.075215][T28168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:29:05 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 21) 10:29:05 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0xffff030000000000) 10:29:05 executing program 1: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) syz_clone3(&(0x7f0000000300)={0x8000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[r1, r0, r1, r1, r1, r0, r0], 0x7}, 0x58) r2 = getpid() process_vm_readv(r2, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x8000}, 0x8) 10:29:05 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) 10:29:05 executing program 0: r0 = getpid() syz_clone3(&(0x7f0000000680)={0x0, 0x0, 0x0, &(0x7f0000000480), {0x8}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[r0], 0x1}, 0x58) 10:29:05 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000021c0)={0x6, 0x3, &(0x7f0000002040)=@raw=[@call={0x85, 0x0, 0x0, 0x21}, @map_fd={0x18, 0xb}], &(0x7f0000002080)='syzkaller\x00', 0x2, 0x5d, &(0x7f00000020c0)=""/93, 0x41100, 0x11, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000002140)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000002180)={0x2, 0x8, 0x9, 0x9898}, 0x10}, 0x80) r2 = getpid() syz_open_procfs$userns(r2, 0x0) process_vm_readv(r2, 0x0, 0xfffffffffffffdd3, 0x0, 0x0, 0x0) 10:29:05 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/devfreq-event', 0x80000, 0x24) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r1, 0x2, 0x70bd25, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x24000810}, 0x8080) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000040)={0xffffffffffffffff, 0x2, 0x0, 0x4000000000020003}) syz_open_dev$vcsu(&(0x7f0000000000), 0x8, 0x1) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000400)={'tunl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x7809, 0x8000, 0x6, 0xeb, {{0x21, 0x4, 0x3, 0x2, 0x84, 0x67, 0x0, 0x2, 0x4, 0x0, @private=0xa010100, @remote, {[@cipso={0x86, 0x36, 0x2, [{0x6, 0xb, "f153dae4248a4c091d"}, {0x0, 0x7, "8a5a2b55de"}, {0x2, 0x8, "099ab3478802"}, {0x2, 0xd, "cd2a57ce2ee6665c2c94af"}, {0x6, 0x9, "e4aacbb31e9ac9"}]}, @noop, @ssrr={0x89, 0xb, 0x2a, [@rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x37}]}, @ssrr={0x89, 0x1b, 0x53, [@broadcast, @rand_addr=0x64010102, @multicast2, @loopback, @loopback, @empty]}, @generic={0x7, 0xc, "7207aa306d60cdad11ff"}, @ra={0x94, 0x4}]}}}}}) sendmsg$ETHTOOL_MSG_EEE_GET(r2, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8001}, 0x4000040) [ 147.083026][T28168] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 147.090862][T28168] [ 147.107171][T28195] FAULT_INJECTION: forcing a failure. [ 147.107171][T28195] name failslab, interval 1, probability 0, space 0, times 0 10:29:05 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) (async) r0 = getpid() syz_open_procfs$userns(r0, 0x0) (async) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000021c0)={0x6, 0x3, &(0x7f0000002040)=@raw=[@call={0x85, 0x0, 0x0, 0x21}, @map_fd={0x18, 0xb}], &(0x7f0000002080)='syzkaller\x00', 0x2, 0x5d, &(0x7f00000020c0)=""/93, 0x41100, 0x11, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000002140)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000002180)={0x2, 0x8, 0x9, 0x9898}, 0x10}, 0x80) (async) r2 = getpid() syz_open_procfs$userns(r2, 0x0) (async) process_vm_readv(r2, 0x0, 0xfffffffffffffdd3, 0x0, 0x0, 0x0) 10:29:05 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) 10:29:05 executing program 1: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) syz_clone3(&(0x7f0000000300)={0x8000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[r1, r0, r1, r1, r1, r0, r0], 0x7}, 0x58) r2 = getpid() process_vm_readv(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:05 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) [ 147.129125][T28195] CPU: 0 PID: 28195 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 147.139282][T28195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 147.149175][T28195] Call Trace: [ 147.152296][T28195] [ 147.155076][T28195] dump_stack_lvl+0x151/0x1b7 [ 147.159623][T28195] ? io_uring_drop_tctx_refs+0x190/0x190 [ 147.165058][T28195] dump_stack+0x15/0x17 [ 147.169048][T28195] should_fail+0x3c6/0x510 [ 147.173302][T28195] __should_failslab+0xa4/0xe0 [ 147.177927][T28195] should_failslab+0x9/0x20 [ 147.182440][T28195] slab_pre_alloc_hook+0x37/0xd0 10:29:05 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) r0 = getpid() syz_open_procfs$userns(r0, 0x0) (async) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000021c0)={0x6, 0x3, &(0x7f0000002040)=@raw=[@call={0x85, 0x0, 0x0, 0x21}, @map_fd={0x18, 0xb}], &(0x7f0000002080)='syzkaller\x00', 0x2, 0x5d, &(0x7f00000020c0)=""/93, 0x41100, 0x11, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000002140)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000002180)={0x2, 0x8, 0x9, 0x9898}, 0x10}, 0x80) r2 = getpid() syz_open_procfs$userns(r2, 0x0) process_vm_readv(r2, 0x0, 0xfffffffffffffdd3, 0x0, 0x0, 0x0) [ 147.187189][T28195] __kmalloc+0x6d/0x270 [ 147.191175][T28195] ? kvmalloc_node+0x1f0/0x4d0 [ 147.195775][T28195] kvmalloc_node+0x1f0/0x4d0 [ 147.200205][T28195] ? vm_mmap+0xb0/0xb0 [ 147.204110][T28195] ? __kasan_kmalloc+0x9/0x10 [ 147.208624][T28195] ? kmem_cache_alloc_trace+0x115/0x210 [ 147.214004][T28195] ? alloc_fdtable+0xaf/0x2a0 [ 147.218518][T28195] alloc_fdtable+0x163/0x2a0 [ 147.222948][T28195] dup_fd+0x759/0xb00 [ 147.226761][T28195] ? avc_has_perm+0x16f/0x260 [ 147.231280][T28195] copy_files+0xe6/0x200 [ 147.235357][T28195] ? perf_event_attrs+0x30/0x30 [ 147.240040][T28195] ? dup_task_struct+0xc60/0xc60 [ 147.244818][T28195] ? security_task_alloc+0xf9/0x130 [ 147.249852][T28195] copy_process+0x11f3/0x3260 [ 147.254365][T28195] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 147.259310][T28195] ? copy_clone_args_from_user+0x744/0x830 [ 147.264948][T28195] kernel_clone+0x21e/0x9e0 [ 147.269293][T28195] ? __delayed_free_task+0x20/0x20 [ 147.274233][T28195] ? vfs_write+0x9ec/0x1110 [ 147.278578][T28195] ? create_io_thread+0x1e0/0x1e0 [ 147.283436][T28195] __x64_sys_clone3+0x376/0x3a0 [ 147.288129][T28195] ? __ia32_sys_clone+0x290/0x290 [ 147.292982][T28195] ? fput+0x1a/0x20 [ 147.296623][T28195] ? debug_smp_processor_id+0x17/0x20 [ 147.301833][T28195] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 147.307732][T28195] ? exit_to_user_mode_prepare+0x39/0xa0 [ 147.313201][T28195] do_syscall_64+0x3d/0xb0 [ 147.317454][T28195] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 147.323182][T28195] RIP: 0033:0x7f52511e2ae9 [ 147.327438][T28195] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 147.346878][T28195] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 147.355122][T28195] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 147.362939][T28195] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 147.370745][T28195] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 147.378555][T28195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:29:05 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 22) 10:29:05 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/107, 0x6b}, {&(0x7f0000001700)=""/4096, 0x1000}], 0x2, &(0x7f0000000380)=[{&(0x7f0000002700)=""/163, 0xa3}, {&(0x7f00000027c0)=""/125, 0x7d}, {&(0x7f0000002840)=""/66, 0x42}], 0x3, 0x0) syz_open_procfs$userns(r0, 0x0) process_vm_readv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/183, 0xb7}, {&(0x7f00000000c0)=""/190, 0xbe}, {&(0x7f0000000180)=""/115, 0x73}], 0x3, &(0x7f0000001580)=[{&(0x7f0000000240)=""/68, 0x44}, {&(0x7f0000001600)=""/199, 0xc7}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/190, 0xbe}, {&(0x7f0000001480)=""/11, 0xb}, {&(0x7f00000014c0)=""/158, 0x9e}], 0x6, 0x0) 10:29:05 executing program 0: r0 = getpid() syz_clone3(&(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, {0x8}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[r0], 0x1}, 0x58) 10:29:05 executing program 1: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) syz_clone3(&(0x7f0000000300)={0x8000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[r1, r0, r1, r1, r1, r0, r0], 0x7}, 0x58) getpid() 10:29:05 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/devfreq-event', 0x80000, 0x24) (async) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r1, 0x2, 0x70bd25, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x24000810}, 0x8080) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000040)={0xffffffffffffffff, 0x2, 0x0, 0x4000000000020003}) syz_open_dev$vcsu(&(0x7f0000000000), 0x8, 0x1) (async) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r2) (async, rerun: 32) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000400)={'tunl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x7809, 0x8000, 0x6, 0xeb, {{0x21, 0x4, 0x3, 0x2, 0x84, 0x67, 0x0, 0x2, 0x4, 0x0, @private=0xa010100, @remote, {[@cipso={0x86, 0x36, 0x2, [{0x6, 0xb, "f153dae4248a4c091d"}, {0x0, 0x7, "8a5a2b55de"}, {0x2, 0x8, "099ab3478802"}, {0x2, 0xd, "cd2a57ce2ee6665c2c94af"}, {0x6, 0x9, "e4aacbb31e9ac9"}]}, @noop, @ssrr={0x89, 0xb, 0x2a, [@rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x37}]}, @ssrr={0x89, 0x1b, 0x53, [@broadcast, @rand_addr=0x64010102, @multicast2, @loopback, @loopback, @empty]}, @generic={0x7, 0xc, "7207aa306d60cdad11ff"}, @ra={0x94, 0x4}]}}}}}) (rerun: 32) sendmsg$ETHTOOL_MSG_EEE_GET(r2, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8001}, 0x4000040) 10:29:05 executing program 4: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000000680)={0x100100, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x8}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[0x0], 0x1}, 0x58) 10:29:05 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/107, 0x6b}, {&(0x7f0000001700)=""/4096, 0x1000}], 0x2, &(0x7f0000000380)=[{&(0x7f0000002700)=""/163, 0xa3}, {&(0x7f00000027c0)=""/125, 0x7d}, {&(0x7f0000002840)=""/66, 0x42}], 0x3, 0x0) (async) process_vm_readv(r0, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/107, 0x6b}, {&(0x7f0000001700)=""/4096, 0x1000}], 0x2, &(0x7f0000000380)=[{&(0x7f0000002700)=""/163, 0xa3}, {&(0x7f00000027c0)=""/125, 0x7d}, {&(0x7f0000002840)=""/66, 0x42}], 0x3, 0x0) syz_open_procfs$userns(r0, 0x0) process_vm_readv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/183, 0xb7}, {&(0x7f00000000c0)=""/190, 0xbe}, {&(0x7f0000000180)=""/115, 0x73}], 0x3, &(0x7f0000001580)=[{&(0x7f0000000240)=""/68, 0x44}, {&(0x7f0000001600)=""/199, 0xc7}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/190, 0xbe}, {&(0x7f0000001480)=""/11, 0xb}, {&(0x7f00000014c0)=""/158, 0x9e}], 0x6, 0x0) 10:29:05 executing program 0: r0 = getpid() syz_clone3(&(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000000)=""/142, 0x8e, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[r0], 0x1}, 0x58) 10:29:05 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = getpid() process_vm_readv(r0, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/107, 0x6b}, {&(0x7f0000001700)=""/4096, 0x1000}], 0x2, &(0x7f0000000380)=[{&(0x7f0000002700)=""/163, 0xa3}, {&(0x7f00000027c0)=""/125, 0x7d}, {&(0x7f0000002840)=""/66, 0x42}], 0x3, 0x0) (async) syz_open_procfs$userns(r0, 0x0) process_vm_readv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/183, 0xb7}, {&(0x7f00000000c0)=""/190, 0xbe}, {&(0x7f0000000180)=""/115, 0x73}], 0x3, &(0x7f0000001580)=[{&(0x7f0000000240)=""/68, 0x44}, {&(0x7f0000001600)=""/199, 0xc7}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/190, 0xbe}, {&(0x7f0000001480)=""/11, 0xb}, {&(0x7f00000014c0)=""/158, 0x9e}], 0x6, 0x0) 10:29:05 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/devfreq-event', 0x80000, 0x24) (async) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/devfreq-event', 0x80000, 0x24) syz_genetlink_get_family_id$mptcp(&(0x7f0000000140), 0xffffffffffffffff) (async) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r1, 0x2, 0x70bd25, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x24000810}, 0x8080) (async) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r1, 0x2, 0x70bd25, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x24000810}, 0x8080) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000040)={0xffffffffffffffff, 0x2, 0x0, 0x4000000000020003}) syz_open_dev$vcsu(&(0x7f0000000000), 0x8, 0x1) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000400)={'tunl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x7809, 0x8000, 0x6, 0xeb, {{0x21, 0x4, 0x3, 0x2, 0x84, 0x67, 0x0, 0x2, 0x4, 0x0, @private=0xa010100, @remote, {[@cipso={0x86, 0x36, 0x2, [{0x6, 0xb, "f153dae4248a4c091d"}, {0x0, 0x7, "8a5a2b55de"}, {0x2, 0x8, "099ab3478802"}, {0x2, 0xd, "cd2a57ce2ee6665c2c94af"}, {0x6, 0x9, "e4aacbb31e9ac9"}]}, @noop, @ssrr={0x89, 0xb, 0x2a, [@rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x37}]}, @ssrr={0x89, 0x1b, 0x53, [@broadcast, @rand_addr=0x64010102, @multicast2, @loopback, @loopback, @empty]}, @generic={0x7, 0xc, "7207aa306d60cdad11ff"}, @ra={0x94, 0x4}]}}}}}) sendmsg$ETHTOOL_MSG_EEE_GET(r2, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8001}, 0x4000040) 10:29:05 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000000000)={0x7fffffffffffffff, 0x1, 0x5}, &(0x7f0000000040)=[{}, {}, {}, {}, {}]) process_vm_readv(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f00000002c0)=""/152, 0x98}, {&(0x7f0000000380)=""/64, 0x40}, {&(0x7f00000003c0)=""/42, 0x2a}, {&(0x7f0000000400)=""/110, 0x6e}, {&(0x7f0000000480)=""/254, 0xfe}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/5, 0x5}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/115, 0x73}], 0x9, &(0x7f0000000b40)=[{&(0x7f00000007c0)=""/48, 0x30}, {&(0x7f0000000800)=""/81, 0x51}, {&(0x7f0000000880)=""/86, 0x56}, {&(0x7f0000000900)=""/106, 0x6a}, {&(0x7f0000000980)=""/161, 0xa1}, {&(0x7f0000000a40)}, {&(0x7f0000000a80)=""/191, 0xbf}], 0x7, 0x0) [ 147.386365][T28195] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 147.394180][T28195] [ 147.417773][T28231] FAULT_INJECTION: forcing a failure. [ 147.417773][T28231] name fail_page_alloc, interval 1, probability 0, space 0, times 0 10:29:05 executing program 1: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) syz_clone3(&(0x7f0000000300)={0x8000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[r1, r0, r1, r1, r1, r0, r0], 0x7}, 0x58) [ 147.469492][T28231] CPU: 1 PID: 28231 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 147.479661][T28231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 147.489561][T28231] Call Trace: [ 147.492680][T28231] [ 147.495454][T28231] dump_stack_lvl+0x151/0x1b7 [ 147.499970][T28231] ? io_uring_drop_tctx_refs+0x190/0x190 [ 147.505437][T28231] dump_stack+0x15/0x17 [ 147.509431][T28231] should_fail+0x3c6/0x510 [ 147.513682][T28231] should_fail_alloc_page+0x5a/0x80 [ 147.518714][T28231] prepare_alloc_pages+0x15c/0x700 [ 147.523662][T28231] ? __alloc_pages_bulk+0xf50/0xf50 [ 147.528814][T28231] ? __alloc_pages+0x5e0/0x5e0 [ 147.533406][T28231] __alloc_pages+0x138/0x5e0 [ 147.537832][T28231] ? zone_watermark_fast+0x220/0x220 [ 147.542951][T28231] ? __alloc_pages+0x206/0x5e0 [ 147.547559][T28231] ? zone_watermark_fast+0x220/0x220 [ 147.552673][T28231] ? __kasan_check_write+0x14/0x20 [ 147.557618][T28231] ? _raw_spin_lock+0xa4/0x1b0 [ 147.562237][T28231] pte_alloc_one+0x73/0x1b0 [ 147.566562][T28231] ? pfn_modify_allowed+0x2f0/0x2f0 [ 147.571596][T28231] ? __pmd_alloc+0x48d/0x550 [ 147.576020][T28231] __pte_alloc+0x86/0x350 [ 147.580186][T28231] ? __pud_alloc+0x260/0x260 [ 147.584610][T28231] ? __pud_alloc+0x213/0x260 [ 147.589124][T28231] ? free_pgtables+0x280/0x280 [ 147.593723][T28231] ? do_handle_mm_fault+0x2330/0x2330 [ 147.598933][T28231] ? __stack_depot_save+0x34/0x470 [ 147.603880][T28231] ? anon_vma_clone+0x9a/0x500 [ 147.608483][T28231] copy_page_range+0x28a8/0x2f90 [ 147.613255][T28231] ? __kasan_slab_alloc+0xb1/0xe0 [ 147.618121][T28231] ? slab_post_alloc_hook+0x53/0x2c0 [ 147.623234][T28231] ? copy_process+0x12bc/0x3260 [ 147.627920][T28231] ? __x64_sys_clone3+0x376/0x3a0 [ 147.632780][T28231] ? do_syscall_64+0x3d/0xb0 [ 147.637205][T28231] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 147.643112][T28231] ? pfn_valid+0x1e0/0x1e0 [ 147.647360][T28231] ? rwsem_write_trylock+0x15b/0x290 [ 147.652481][T28231] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 147.658737][T28231] dup_mm+0xadc/0x12c0 [ 147.662639][T28231] ? copy_init_mm+0x20/0x20 [ 147.666980][T28231] copy_mm+0x107/0x1b0 [ 147.670883][T28231] copy_process+0x12bc/0x3260 [ 147.675399][T28231] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 147.680345][T28231] ? copy_clone_args_from_user+0x744/0x830 [ 147.685984][T28231] kernel_clone+0x21e/0x9e0 [ 147.690328][T28231] ? __delayed_free_task+0x20/0x20 [ 147.695272][T28231] ? vfs_write+0x9ec/0x1110 [ 147.699613][T28231] ? create_io_thread+0x1e0/0x1e0 [ 147.704475][T28231] __x64_sys_clone3+0x376/0x3a0 [ 147.709158][T28231] ? __ia32_sys_clone+0x290/0x290 [ 147.714021][T28231] ? fput+0x1a/0x20 [ 147.717667][T28231] ? debug_smp_processor_id+0x17/0x20 [ 147.723046][T28231] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 147.728958][T28231] ? exit_to_user_mode_prepare+0x39/0xa0 [ 147.734420][T28231] do_syscall_64+0x3d/0xb0 [ 147.738755][T28231] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 147.744491][T28231] RIP: 0033:0x7f52511e2ae9 [ 147.748737][T28231] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 10:29:06 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 23) 10:29:06 executing program 0: r0 = getpid() syz_clone3(&(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/139, &(0x7f0000000640)=[r0], 0x1}, 0x58) 10:29:06 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000000000)=""/77, 0x7f}, {0x0}], 0x2, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x8800, 0x0) r6 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000540)) r7 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000000740)) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb4, r1, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xff}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7fff}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1e75}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x34, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r2}, {0x8}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}]}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r6}, {0x8}, {0x8, 0x1, r7}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x80000001}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4008806}, 0x4044000) 10:29:06 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000000000)={0x7fffffffffffffff, 0x1, 0x5}, &(0x7f0000000040)=[{}, {}, {}, {}, {}]) process_vm_readv(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f00000002c0)=""/152, 0x98}, {&(0x7f0000000380)=""/64, 0x40}, {&(0x7f00000003c0)=""/42, 0x2a}, {&(0x7f0000000400)=""/110, 0x6e}, {&(0x7f0000000480)=""/254, 0xfe}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/5, 0x5}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/115, 0x73}], 0x9, &(0x7f0000000b40)=[{&(0x7f00000007c0)=""/48, 0x30}, {&(0x7f0000000800)=""/81, 0x51}, {&(0x7f0000000880)=""/86, 0x56}, {&(0x7f0000000900)=""/106, 0x6a}, {&(0x7f0000000980)=""/161, 0xa1}, {&(0x7f0000000a40)}, {&(0x7f0000000a80)=""/191, 0xbf}], 0x7, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000000000)={0x7fffffffffffffff, 0x1, 0x5}, &(0x7f0000000040)=[{}, {}, {}, {}, {}]) (async) process_vm_readv(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f00000002c0)=""/152, 0x98}, {&(0x7f0000000380)=""/64, 0x40}, {&(0x7f00000003c0)=""/42, 0x2a}, {&(0x7f0000000400)=""/110, 0x6e}, {&(0x7f0000000480)=""/254, 0xfe}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/5, 0x5}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/115, 0x73}], 0x9, &(0x7f0000000b40)=[{&(0x7f00000007c0)=""/48, 0x30}, {&(0x7f0000000800)=""/81, 0x51}, {&(0x7f0000000880)=""/86, 0x56}, {&(0x7f0000000900)=""/106, 0x6a}, {&(0x7f0000000980)=""/161, 0xa1}, {&(0x7f0000000a40)}, {&(0x7f0000000a80)=""/191, 0xbf}], 0x7, 0x0) (async) 10:29:06 executing program 1: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_clone3(&(0x7f0000000300)={0x8000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[r1, r0, r1, r1, r1, r0, r0], 0x7}, 0x58) 10:29:06 executing program 4: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000000000)={0x7fffffffffffffff, 0x1, 0x5}, &(0x7f0000000040)=[{}, {}, {}, {}, {}]) process_vm_readv(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f00000002c0)=""/152, 0x98}, {&(0x7f0000000380)=""/64, 0x40}, {&(0x7f00000003c0)=""/42, 0x2a}, {&(0x7f0000000400)=""/110, 0x6e}, {&(0x7f0000000480)=""/254, 0xfe}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/5, 0x5}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/115, 0x73}], 0x9, &(0x7f0000000b40)=[{&(0x7f00000007c0)=""/48, 0x30}, {&(0x7f0000000800)=""/81, 0x51}, {&(0x7f0000000880)=""/86, 0x56}, {&(0x7f0000000900)=""/106, 0x6a}, {&(0x7f0000000980)=""/161, 0xa1}, {&(0x7f0000000a40)}, {&(0x7f0000000a80)=""/191, 0xbf}], 0x7, 0x0) 10:29:06 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000000000)={0x7fffffffffffffff, 0x1, 0x5}, &(0x7f0000000040)=[{}, {}, {}, {}, {}]) (async) process_vm_readv(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f00000002c0)=""/152, 0x98}, {&(0x7f0000000380)=""/64, 0x40}, {&(0x7f00000003c0)=""/42, 0x2a}, {&(0x7f0000000400)=""/110, 0x6e}, {&(0x7f0000000480)=""/254, 0xfe}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/5, 0x5}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/115, 0x73}], 0x9, &(0x7f0000000b40)=[{&(0x7f00000007c0)=""/48, 0x30}, {&(0x7f0000000800)=""/81, 0x51}, {&(0x7f0000000880)=""/86, 0x56}, {&(0x7f0000000900)=""/106, 0x6a}, {&(0x7f0000000980)=""/161, 0xa1}, {&(0x7f0000000a40)}, {&(0x7f0000000a80)=""/191, 0xbf}], 0x7, 0x0) 10:29:06 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000000000)=""/77, 0x7f}, {0x0}], 0x2, 0x0) (async) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) (rerun: 32) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) (async) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x8800, 0x0) (async, rerun: 64) r6 = open(0x0, 0x680002, 0x0) (rerun: 64) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000540)) (async) r7 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000000740)) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb4, r1, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xff}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7fff}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1e75}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x34, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r2}, {0x8}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}]}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r6}, {0x8}, {0x8, 0x1, r7}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x80000001}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4008806}, 0x4044000) [ 147.768177][T28231] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 147.776420][T28231] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 147.784231][T28231] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 147.792050][T28231] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 147.800377][T28231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 147.808193][T28231] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 147.816011][T28231] 10:29:06 executing program 4: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000000000)={0x7fffffffffffffff, 0x1, 0x5}, &(0x7f0000000040)=[{}, {}, {}, {}, {}]) process_vm_readv(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f00000002c0)=""/152, 0x98}, {&(0x7f0000000380)=""/64, 0x40}, {&(0x7f00000003c0)=""/42, 0x2a}, {&(0x7f0000000400)=""/110, 0x6e}, {&(0x7f0000000480)=""/254, 0xfe}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/5, 0x5}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/115, 0x73}], 0x9, &(0x7f0000000b40)=[{&(0x7f00000007c0)=""/48, 0x30}, {&(0x7f0000000800)=""/81, 0x51}, {&(0x7f0000000880)=""/86, 0x56}, {&(0x7f0000000900)=""/106, 0x6a}, {&(0x7f0000000980)=""/161, 0xa1}, {&(0x7f0000000a40)}, {&(0x7f0000000a80)=""/191, 0xbf}], 0x7, 0x0) 10:29:06 executing program 5: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2cb4e18e7ce1d124}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r0}]}, 0x38}, 0x1, 0x0, 0x0, 0x45}, 0x20000010) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:06 executing program 1: r0 = getpid() syz_open_procfs$userns(r0, 0x0) syz_clone3(&(0x7f0000000300)={0x8000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, r0, 0x0, 0x0, 0x0, r0, r0], 0x7}, 0x58) 10:29:06 executing program 0: r0 = getpid() syz_clone3(&(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r0], 0x1}, 0x58) [ 147.854034][T28263] FAULT_INJECTION: forcing a failure. [ 147.854034][T28263] name failslab, interval 1, probability 0, space 0, times 0 [ 147.895848][T28263] CPU: 0 PID: 28263 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 147.906006][T28263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 147.915899][T28263] Call Trace: [ 147.919024][T28263] [ 147.921797][T28263] dump_stack_lvl+0x151/0x1b7 [ 147.926314][T28263] ? io_uring_drop_tctx_refs+0x190/0x190 [ 147.931786][T28263] dump_stack+0x15/0x17 [ 147.935771][T28263] should_fail+0x3c6/0x510 [ 147.940026][T28263] __should_failslab+0xa4/0xe0 [ 147.944627][T28263] ? copy_sighand+0x54/0x250 [ 147.949051][T28263] should_failslab+0x9/0x20 [ 147.953391][T28263] slab_pre_alloc_hook+0x37/0xd0 [ 147.958172][T28263] ? copy_sighand+0x54/0x250 [ 147.962600][T28263] kmem_cache_alloc+0x44/0x200 [ 147.967193][T28263] copy_sighand+0x54/0x250 [ 147.971745][T28263] copy_process+0x1249/0x3260 [ 147.976218][T28263] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 147.981161][T28263] ? copy_clone_args_from_user+0x744/0x830 [ 147.986804][T28263] kernel_clone+0x21e/0x9e0 [ 147.991140][T28263] ? __delayed_free_task+0x20/0x20 [ 147.996086][T28263] ? vfs_write+0x9ec/0x1110 [ 148.001035][T28263] ? create_io_thread+0x1e0/0x1e0 [ 148.005896][T28263] __x64_sys_clone3+0x376/0x3a0 [ 148.010583][T28263] ? __ia32_sys_clone+0x290/0x290 [ 148.015441][T28263] ? fput+0x1a/0x20 [ 148.019099][T28263] ? debug_smp_processor_id+0x17/0x20 [ 148.024294][T28263] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 148.030195][T28263] ? exit_to_user_mode_prepare+0x39/0xa0 [ 148.035662][T28263] do_syscall_64+0x3d/0xb0 [ 148.039917][T28263] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 148.045646][T28263] RIP: 0033:0x7f52511e2ae9 [ 148.049900][T28263] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 148.069337][T28263] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 148.077582][T28263] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 148.085396][T28263] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 10:29:06 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 24) 10:29:06 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000000000)=""/77, 0x7f}, {0x0}], 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x8800, 0x0) (async) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x8800, 0x0) open(0x0, 0x680002, 0x0) (async) r6 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000540)) r7 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000000740)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000000740)) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb4, r1, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xff}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7fff}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1e75}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x34, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r2}, {0x8}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}]}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r6}, {0x8}, {0x8, 0x1, r7}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x80000001}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4008806}, 0x4044000) 10:29:06 executing program 5: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2cb4e18e7ce1d124}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r0}]}, 0x38}, 0x1, 0x0, 0x0, 0x45}, 0x20000010) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00'}) (async) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2cb4e18e7ce1d124}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r0}]}, 0x38}, 0x1, 0x0, 0x0, 0x45}, 0x20000010) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 10:29:06 executing program 1: r0 = getpid() syz_clone3(&(0x7f0000000300)={0x8000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, r0, 0x0, 0x0, 0x0, r0, r0], 0x7}, 0x58) 10:29:06 executing program 4: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000000000)={0x7fffffffffffffff, 0x1, 0x5}, &(0x7f0000000040)=[{}, {}, {}, {}, {}]) process_vm_readv(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f00000002c0)=""/152, 0x98}, {&(0x7f0000000380)=""/64, 0x40}, {&(0x7f00000003c0)=""/42, 0x2a}, {&(0x7f0000000400)=""/110, 0x6e}, {&(0x7f0000000480)=""/254, 0xfe}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/5, 0x5}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/115, 0x73}], 0x9, &(0x7f0000000b40)=[{&(0x7f00000007c0)=""/48, 0x30}, {&(0x7f0000000800)=""/81, 0x51}, {&(0x7f0000000880)=""/86, 0x56}, {&(0x7f0000000900)=""/106, 0x6a}, {&(0x7f0000000980)=""/161, 0xa1}, {&(0x7f0000000a40)}, {&(0x7f0000000a80)=""/191, 0xbf}], 0x7, 0x0) 10:29:06 executing program 0: getpid() syz_clone3(&(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 148.093205][T28263] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 148.101016][T28263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 148.108830][T28263] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 148.116645][T28263] [ 148.131458][T28283] FAULT_INJECTION: forcing a failure. [ 148.131458][T28283] name failslab, interval 1, probability 0, space 0, times 0 10:29:06 executing program 0: getpid() syz_clone3(&(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:06 executing program 4: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000000000)={0x7fffffffffffffff, 0x1, 0x5}, &(0x7f0000000040)=[{}, {}, {}, {}, {}]) 10:29:06 executing program 5: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2cb4e18e7ce1d124}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r0}]}, 0x38}, 0x1, 0x0, 0x0, 0x45}, 0x20000010) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00'}) (async) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2cb4e18e7ce1d124}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r0}]}, 0x38}, 0x1, 0x0, 0x0, 0x45}, 0x20000010) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 10:29:06 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:06 executing program 1: syz_clone3(&(0x7f0000000300)={0x8000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) 10:29:06 executing program 4: ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000000000)={0x7fffffffffffffff, 0x1, 0x5}, &(0x7f0000000040)=[{}, {}, {}, {}, {}]) [ 148.152095][T28283] CPU: 0 PID: 28283 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 148.162251][T28283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 148.172154][T28283] Call Trace: [ 148.175280][T28283] [ 148.178046][T28283] dump_stack_lvl+0x151/0x1b7 [ 148.182559][T28283] ? io_uring_drop_tctx_refs+0x190/0x190 [ 148.188029][T28283] dump_stack+0x15/0x17 [ 148.192018][T28283] should_fail+0x3c6/0x510 [ 148.196270][T28283] __should_failslab+0xa4/0xe0 [ 148.200865][T28283] ? copy_signal+0x55/0x610 [ 148.205205][T28283] should_failslab+0x9/0x20 [ 148.209550][T28283] slab_pre_alloc_hook+0x37/0xd0 [ 148.214322][T28283] ? copy_signal+0x55/0x610 [ 148.218666][T28283] kmem_cache_alloc+0x44/0x200 [ 148.223265][T28283] copy_signal+0x55/0x610 [ 148.227433][T28283] copy_process+0x1274/0x3260 [ 148.231942][T28283] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 148.236886][T28283] ? copy_clone_args_from_user+0x744/0x830 [ 148.242532][T28283] kernel_clone+0x21e/0x9e0 [ 148.246903][T28283] ? __delayed_free_task+0x20/0x20 [ 148.251817][T28283] ? vfs_write+0x9ec/0x1110 [ 148.256153][T28283] ? create_io_thread+0x1e0/0x1e0 [ 148.261016][T28283] __x64_sys_clone3+0x376/0x3a0 [ 148.265700][T28283] ? __ia32_sys_clone+0x290/0x290 [ 148.270564][T28283] ? fput+0x1a/0x20 [ 148.274207][T28283] ? debug_smp_processor_id+0x17/0x20 [ 148.279416][T28283] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 148.285325][T28283] ? exit_to_user_mode_prepare+0x39/0xa0 [ 148.290787][T28283] do_syscall_64+0x3d/0xb0 [ 148.295034][T28283] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 148.300767][T28283] RIP: 0033:0x7f52511e2ae9 [ 148.305016][T28283] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 148.324460][T28283] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 148.332702][T28283] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 148.340512][T28283] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 10:29:06 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 25) 10:29:06 executing program 4: ptrace$peeksig(0x4209, 0xffffffffffffffff, 0x0, &(0x7f0000000040)=[{}, {}, {}, {}, {}]) 10:29:06 executing program 1: syz_clone3(0x0, 0x0) 10:29:06 executing program 0: getpid() syz_clone3(&(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:06 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:06 executing program 5: ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x8000, 0x8, 0x2, 0xce2, {{0xd, 0x4, 0x3, 0x8, 0x34, 0x66, 0x0, 0x5, 0x29, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x31}, {[@timestamp_addr={0x44, 0xc, 0xed, 0x1, 0x4, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}]}, @cipso={0x86, 0x6, 0x2}, @noop, @timestamp={0x44, 0xc, 0xf5, 0x0, 0x2, [0x9, 0x6]}]}}}}}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:06 executing program 4: ptrace$peeksig(0x4209, 0xffffffffffffffff, 0x0, 0x0) 10:29:06 executing program 1: syz_clone3(0x0, 0x0) [ 148.348330][T28283] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 148.356137][T28283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 148.363945][T28283] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 148.371761][T28283] 10:29:06 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:06 executing program 5: ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x8000, 0x8, 0x2, 0xce2, {{0xd, 0x4, 0x3, 0x8, 0x34, 0x66, 0x0, 0x5, 0x29, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x31}, {[@timestamp_addr={0x44, 0xc, 0xed, 0x1, 0x4, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}]}, @cipso={0x86, 0x6, 0x2}, @noop, @timestamp={0x44, 0xc, 0xf5, 0x0, 0x2, [0x9, 0x6]}]}}}}}) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:06 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0xa2000, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000040)) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) 10:29:06 executing program 0: getpid() syz_clone3(&(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000640)}, 0x58) [ 148.395187][T28319] FAULT_INJECTION: forcing a failure. [ 148.395187][T28319] name failslab, interval 1, probability 0, space 0, times 0 [ 148.418392][T28319] CPU: 0 PID: 28319 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 148.428550][T28319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 148.438444][T28319] Call Trace: [ 148.441565][T28319] [ 148.444338][T28319] dump_stack_lvl+0x151/0x1b7 [ 148.448856][T28319] ? io_uring_drop_tctx_refs+0x190/0x190 [ 148.454328][T28319] ? slab_post_alloc_hook+0x53/0x2c0 [ 148.459443][T28319] ? copy_signal+0x55/0x610 [ 148.463784][T28319] ? copy_process+0x1274/0x3260 [ 148.468468][T28319] ? kernel_clone+0x21e/0x9e0 [ 148.472983][T28319] ? do_syscall_64+0x3d/0xb0 [ 148.477409][T28319] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 148.483325][T28319] dump_stack+0x15/0x17 [ 148.487316][T28319] should_fail+0x3c6/0x510 [ 148.491559][T28319] __should_failslab+0xa4/0xe0 [ 148.496156][T28319] ? dup_mm+0x95/0x12c0 [ 148.500151][T28319] should_failslab+0x9/0x20 [ 148.504485][T28319] slab_pre_alloc_hook+0x37/0xd0 [ 148.509257][T28319] ? dup_mm+0x95/0x12c0 [ 148.513248][T28319] kmem_cache_alloc+0x44/0x200 [ 148.517850][T28319] dup_mm+0x95/0x12c0 [ 148.521671][T28319] ? __kasan_check_write+0x14/0x20 [ 148.526616][T28319] ? copy_init_mm+0x20/0x20 [ 148.530954][T28319] copy_mm+0x107/0x1b0 [ 148.534860][T28319] copy_process+0x12bc/0x3260 [ 148.539464][T28319] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 148.544580][T28319] ? copy_clone_args_from_user+0x744/0x830 [ 148.550224][T28319] kernel_clone+0x21e/0x9e0 [ 148.554562][T28319] ? __delayed_free_task+0x20/0x20 [ 148.559511][T28319] ? vfs_write+0x9ec/0x1110 [ 148.563849][T28319] ? create_io_thread+0x1e0/0x1e0 [ 148.568711][T28319] __x64_sys_clone3+0x376/0x3a0 [ 148.573395][T28319] ? __ia32_sys_clone+0x290/0x290 [ 148.578256][T28319] ? fput+0x1a/0x20 [ 148.581902][T28319] ? debug_smp_processor_id+0x17/0x20 [ 148.587107][T28319] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 148.593009][T28319] ? exit_to_user_mode_prepare+0x39/0xa0 [ 148.598479][T28319] do_syscall_64+0x3d/0xb0 [ 148.602733][T28319] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 148.608458][T28319] RIP: 0033:0x7f52511e2ae9 [ 148.612715][T28319] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 148.632155][T28319] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 10:29:07 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 26) 10:29:07 executing program 0: getpid() syz_clone3(&(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000640)}, 0x58) 10:29:07 executing program 5: ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x8000, 0x8, 0x2, 0xce2, {{0xd, 0x4, 0x3, 0x8, 0x34, 0x66, 0x0, 0x5, 0x29, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x31}, {[@timestamp_addr={0x44, 0xc, 0xed, 0x1, 0x4, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}]}, @cipso={0x86, 0x6, 0x2}, @noop, @timestamp={0x44, 0xc, 0xf5, 0x0, 0x2, [0x9, 0x6]}]}}}}}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:07 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0xa2000, 0x0) (async) r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000040)) (async) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) 10:29:07 executing program 1: syz_clone3(0x0, 0x0) 10:29:07 executing program 4: getpid() syz_clone3(&(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 148.640405][T28319] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 148.648296][T28319] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 148.656106][T28319] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 148.664004][T28319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 148.671905][T28319] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 148.679715][T28319] 10:29:07 executing program 5: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000000)) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:07 executing program 1: syz_clone3(&(0x7f0000000300)={0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) 10:29:07 executing program 0: getpid() syz_clone3(&(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000640)}, 0x58) 10:29:07 executing program 5: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000000)) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 148.693104][T28340] FAULT_INJECTION: forcing a failure. [ 148.693104][T28340] name failslab, interval 1, probability 0, space 0, times 0 [ 148.708801][T28340] CPU: 0 PID: 28340 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 148.718948][T28340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 148.728844][T28340] Call Trace: [ 148.731972][T28340] [ 148.734741][T28340] dump_stack_lvl+0x151/0x1b7 [ 148.739259][T28340] ? io_uring_drop_tctx_refs+0x190/0x190 10:29:07 executing program 0: getpid() syz_clone3(&(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000640)=[0x0], 0x1}, 0x58) 10:29:07 executing program 4: syz_clone3(&(0x7f0000000300)={0x8000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) [ 148.744820][T28340] dump_stack+0x15/0x17 [ 148.748802][T28340] should_fail+0x3c6/0x510 [ 148.753065][T28340] __should_failslab+0xa4/0xe0 [ 148.757659][T28340] should_failslab+0x9/0x20 [ 148.761996][T28340] slab_pre_alloc_hook+0x37/0xd0 [ 148.766770][T28340] kmem_cache_alloc_trace+0x48/0x210 [ 148.771911][T28340] ? mm_init+0x39a/0x970 [ 148.775968][T28340] mm_init+0x39a/0x970 [ 148.779877][T28340] dup_mm+0xe5/0x12c0 [ 148.783691][T28340] ? __kasan_check_write+0x14/0x20 [ 148.789242][T28340] ? copy_init_mm+0x20/0x20 [ 148.793584][T28340] copy_mm+0x107/0x1b0 [ 148.797488][T28340] copy_process+0x12bc/0x3260 [ 148.802002][T28340] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 148.806948][T28340] ? copy_clone_args_from_user+0x744/0x830 [ 148.812591][T28340] kernel_clone+0x21e/0x9e0 [ 148.816927][T28340] ? __delayed_free_task+0x20/0x20 [ 148.821875][T28340] ? vfs_write+0x9ec/0x1110 [ 148.826214][T28340] ? create_io_thread+0x1e0/0x1e0 [ 148.831078][T28340] __x64_sys_clone3+0x376/0x3a0 [ 148.835763][T28340] ? __ia32_sys_clone+0x290/0x290 [ 148.840709][T28340] ? fput+0x1a/0x20 [ 148.844356][T28340] ? debug_smp_processor_id+0x17/0x20 [ 148.849563][T28340] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 148.855465][T28340] ? exit_to_user_mode_prepare+0x39/0xa0 [ 148.860934][T28340] do_syscall_64+0x3d/0xb0 [ 148.865184][T28340] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 148.870913][T28340] RIP: 0033:0x7f52511e2ae9 [ 148.875168][T28340] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 148.894608][T28340] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 148.902852][T28340] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 148.910661][T28340] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 148.918473][T28340] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 148.926288][T28340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 148.934270][T28340] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 148.942084][T28340] 10:29:07 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 27) 10:29:07 executing program 5: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000000)) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:07 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0xa2000, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000040)) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) 10:29:07 executing program 1: syz_clone3(&(0x7f0000000300)={0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) 10:29:07 executing program 0: getpid() syz_clone3(&(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000640)=[0x0], 0x1}, 0x58) 10:29:07 executing program 5: r0 = getpid() r1 = getpid() syz_open_procfs$userns(r1, 0x0) r2 = getpid() syz_open_procfs$userns(r2, 0x0) process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:07 executing program 4: syz_clone3(&(0x7f0000000300)={0x8000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) 10:29:07 executing program 5: r0 = getpid() getpid() (async) r1 = getpid() syz_open_procfs$userns(r1, 0x0) getpid() (async) r2 = getpid() syz_open_procfs$userns(r2, 0x0) process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:07 executing program 1: syz_clone3(&(0x7f0000000300)={0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) 10:29:07 executing program 0: getpid() syz_clone3(&(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000640)=[0x0], 0x1}, 0x58) 10:29:07 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xff, 0x9, 0x8}) open(0x0, 0x680002, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000740)) r2 = open(0x0, 0x680002, 0x0) r3 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000340), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000940)) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) mount_setattr(r2, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000, {r4}}, 0x20) syz_genetlink_get_family_id$team(&(0x7f0000000000), r0) 10:29:07 executing program 5: r0 = getpid() (async, rerun: 32) r1 = getpid() (rerun: 32) syz_open_procfs$userns(r1, 0x0) (async, rerun: 32) r2 = getpid() (rerun: 32) syz_open_procfs$userns(r2, 0x0) (async) process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 149.046956][T28381] FAULT_INJECTION: forcing a failure. [ 149.046956][T28381] name failslab, interval 1, probability 0, space 0, times 0 [ 149.084871][T28381] CPU: 0 PID: 28381 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 149.095129][T28381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 149.105015][T28381] Call Trace: [ 149.108133][T28381] [ 149.110909][T28381] dump_stack_lvl+0x151/0x1b7 [ 149.115423][T28381] ? io_uring_drop_tctx_refs+0x190/0x190 [ 149.120891][T28381] dump_stack+0x15/0x17 [ 149.124879][T28381] should_fail+0x3c6/0x510 [ 149.129131][T28381] __should_failslab+0xa4/0xe0 [ 149.133729][T28381] should_failslab+0x9/0x20 [ 149.138068][T28381] slab_pre_alloc_hook+0x37/0xd0 [ 149.142845][T28381] kmem_cache_alloc_trace+0x48/0x210 [ 149.147967][T28381] ? mm_init+0x39a/0x970 [ 149.152047][T28381] mm_init+0x39a/0x970 [ 149.155955][T28381] dup_mm+0xe5/0x12c0 [ 149.159770][T28381] ? __kasan_check_write+0x14/0x20 [ 149.164717][T28381] ? copy_init_mm+0x20/0x20 [ 149.169058][T28381] copy_mm+0x107/0x1b0 [ 149.172962][T28381] copy_process+0x12bc/0x3260 [ 149.177476][T28381] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 149.182428][T28381] ? copy_clone_args_from_user+0x744/0x830 [ 149.188063][T28381] kernel_clone+0x21e/0x9e0 [ 149.192403][T28381] ? __delayed_free_task+0x20/0x20 [ 149.197349][T28381] ? vfs_write+0x9ec/0x1110 [ 149.201704][T28381] ? create_io_thread+0x1e0/0x1e0 [ 149.206552][T28381] __x64_sys_clone3+0x376/0x3a0 [ 149.211246][T28381] ? __ia32_sys_clone+0x290/0x290 [ 149.216099][T28381] ? fput+0x1a/0x20 [ 149.219747][T28381] ? debug_smp_processor_id+0x17/0x20 [ 149.224952][T28381] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 149.230851][T28381] ? exit_to_user_mode_prepare+0x39/0xa0 [ 149.236319][T28381] do_syscall_64+0x3d/0xb0 [ 149.240574][T28381] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 149.246301][T28381] RIP: 0033:0x7f52511e2ae9 [ 149.250553][T28381] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 149.269994][T28381] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 149.278240][T28381] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 149.286050][T28381] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 10:29:07 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 28) 10:29:07 executing program 4: syz_clone3(&(0x7f0000000300)={0x8000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) 10:29:07 executing program 1: syz_clone3(&(0x7f0000000300)={0x8000000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) 10:29:07 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xff, 0x9, 0x8}) open(0x0, 0x680002, 0x0) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) (async) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000740)) (async) r2 = open(0x0, 0x680002, 0x0) (async) r3 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000340), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000940)) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) (async) mount_setattr(r2, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000, {r4}}, 0x20) (async) syz_genetlink_get_family_id$team(&(0x7f0000000000), r0) 10:29:07 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xff, 0x9, 0x8}) open(0x0, 0x680002, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000740)) r2 = open(0x0, 0x680002, 0x0) r3 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000340), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000940)) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) mount_setattr(r2, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000, {r4}}, 0x20) syz_genetlink_get_family_id$team(&(0x7f0000000000), r0) 10:29:07 executing program 5: r0 = syz_clone3(&(0x7f0000000200)={0x45090000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2c}, &(0x7f00000000c0)=""/56, 0x38, &(0x7f0000000100)=""/178, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) read$FUSE(0xffffffffffffffff, &(0x7f0000000280)={0x2020}, 0x2020) process_vm_readv(r0, 0x0, 0x0, 0x0, 0xfffffea6, 0x0) 10:29:07 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) (async) r0 = open(0x0, 0x680002, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xff, 0x9, 0x8}) open(0x0, 0x680002, 0x0) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) (async) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000740)) (async) r2 = open(0x0, 0x680002, 0x0) (async) r3 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000340), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000940)) (async) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) (async) mount_setattr(r2, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000, {r4}}, 0x20) (async) syz_genetlink_get_family_id$team(&(0x7f0000000000), r0) 10:29:07 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xff, 0x9, 0x8}) open(0x0, 0x680002, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000740)) r2 = open(0x0, 0x680002, 0x0) r3 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000340), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000940)) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) mount_setattr(r2, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000, {r4}}, 0x20) syz_genetlink_get_family_id$team(&(0x7f0000000000), r0) [ 149.293990][T28381] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 149.301798][T28381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 149.309612][T28381] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 149.317422][T28381] 10:29:07 executing program 5: r0 = syz_clone3(&(0x7f0000000200)={0x45090000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2c}, &(0x7f00000000c0)=""/56, 0x38, &(0x7f0000000100)=""/178, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) read$FUSE(0xffffffffffffffff, &(0x7f0000000280)={0x2020}, 0x2020) (async) process_vm_readv(r0, 0x0, 0x0, 0x0, 0xfffffea6, 0x0) 10:29:07 executing program 1: syz_clone3(&(0x7f0000000300)={0x8000000, 0x0, 0x0, &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) 10:29:07 executing program 4: syz_clone3(0x0, 0x0) 10:29:07 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000140)=""/82, 0x39}], 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/78, 0x62}, {0x0, 0xffffffffffffffd6}], 0x2, 0x0) [ 149.367013][T28406] FAULT_INJECTION: forcing a failure. [ 149.367013][T28406] name failslab, interval 1, probability 0, space 0, times 0 [ 149.380512][T28406] CPU: 1 PID: 28406 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 149.390664][T28406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 149.400559][T28406] Call Trace: [ 149.403676][T28406] [ 149.406457][T28406] dump_stack_lvl+0x151/0x1b7 [ 149.410974][T28406] ? io_uring_drop_tctx_refs+0x190/0x190 [ 149.416441][T28406] dump_stack+0x15/0x17 [ 149.420435][T28406] should_fail+0x3c6/0x510 [ 149.424685][T28406] __should_failslab+0xa4/0xe0 [ 149.429287][T28406] ? anon_vma_clone+0x9a/0x500 [ 149.433885][T28406] should_failslab+0x9/0x20 [ 149.438224][T28406] slab_pre_alloc_hook+0x37/0xd0 [ 149.442997][T28406] ? anon_vma_clone+0x9a/0x500 [ 149.447599][T28406] kmem_cache_alloc+0x44/0x200 [ 149.452200][T28406] anon_vma_clone+0x9a/0x500 [ 149.456625][T28406] anon_vma_fork+0x91/0x4e0 [ 149.460966][T28406] ? anon_vma_name+0x4c/0x70 [ 149.465390][T28406] ? vm_area_dup+0x17a/0x230 [ 149.469816][T28406] dup_mm+0x8c5/0x12c0 [ 149.473722][T28406] ? copy_init_mm+0x20/0x20 [ 149.478248][T28406] copy_mm+0x107/0x1b0 [ 149.482137][T28406] copy_process+0x12bc/0x3260 [ 149.486736][T28406] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 149.491681][T28406] ? copy_clone_args_from_user+0x744/0x830 [ 149.497325][T28406] kernel_clone+0x21e/0x9e0 [ 149.501662][T28406] ? __delayed_free_task+0x20/0x20 [ 149.506609][T28406] ? vfs_write+0x9ec/0x1110 [ 149.510949][T28406] ? create_io_thread+0x1e0/0x1e0 [ 149.515811][T28406] __x64_sys_clone3+0x376/0x3a0 [ 149.520498][T28406] ? __ia32_sys_clone+0x290/0x290 [ 149.525357][T28406] ? fput+0x1a/0x20 [ 149.529002][T28406] ? debug_smp_processor_id+0x17/0x20 [ 149.534213][T28406] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 149.540112][T28406] ? exit_to_user_mode_prepare+0x39/0xa0 [ 149.545587][T28406] do_syscall_64+0x3d/0xb0 [ 149.549834][T28406] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 149.555559][T28406] RIP: 0033:0x7f52511e2ae9 [ 149.559814][T28406] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 149.579255][T28406] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 149.587499][T28406] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 149.595309][T28406] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 149.603120][T28406] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 10:29:08 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 29) 10:29:08 executing program 5: r0 = syz_clone3(&(0x7f0000000200)={0x45090000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2c}, &(0x7f00000000c0)=""/56, 0x38, &(0x7f0000000100)=""/178, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) read$FUSE(0xffffffffffffffff, &(0x7f0000000280)={0x2020}, 0x2020) (async) process_vm_readv(r0, 0x0, 0x0, 0x0, 0xfffffea6, 0x0) 10:29:08 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000140)=""/82, 0x39}], 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/78, 0x62}, {0x0, 0xffffffffffffffd6}], 0x2, 0x0) 10:29:08 executing program 4: syz_clone3(0x0, 0x0) 10:29:08 executing program 1: syz_clone3(&(0x7f0000000300)={0x8000000, 0x0, 0x0, 0x0, {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) 10:29:08 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xff, 0x9, 0x8}) open(0x0, 0x680002, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000740)) r2 = open(0x0, 0x680002, 0x0) r3 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000340), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000940)) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) mount_setattr(r2, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000, {r4}}, 0x20) syz_genetlink_get_family_id$team(&(0x7f0000000000), r0) 10:29:08 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000140)=""/82, 0x39}], 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/78, 0x62}, {0x0, 0xffffffffffffffd6}], 0x2, 0x0) [ 149.610930][T28406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 149.618745][T28406] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 149.626557][T28406] [ 149.643600][T28434] FAULT_INJECTION: forcing a failure. [ 149.643600][T28434] name failslab, interval 1, probability 0, space 0, times 0 10:29:08 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x42442, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280), 0x101, 0x0) sendmsg$WG_CMD_GET_DEVICE(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0004290b190369bd7000fbdbdf250000000008000700f8ff000006000600"], 0x24}, 0x1, 0x0, 0x0, 0x180}, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg2\x00', 0x0}) process_vm_readv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x18, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x800, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x80a0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x90) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000080)) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000500)={'vxcan1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000b40)={'wg2\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000b80)={'wg2\x00', 0x0}) getsockname$packet(r1, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000c00)=0x14) r9 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r9, 0x81f8943c, &(0x7f0000000540)) dup2(r9, r3) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r4, &(0x7f0000000ec0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000e80)={&(0x7f0000000c40)={0x224, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x224}, 0x1, 0x0, 0x0, 0x40040}, 0x4c001) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000740)={0x0, 0x3, 0x3}) fcntl$addseals(r3, 0x409, 0x8) 10:29:08 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xff, 0x9, 0x8}) open(0x0, 0x680002, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000740)) r2 = open(0x0, 0x680002, 0x0) r3 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000340), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000940)) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) mount_setattr(r2, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000, {r4}}, 0x20) 10:29:08 executing program 4: syz_clone3(0x0, 0x0) 10:29:08 executing program 1: syz_clone3(&(0x7f0000000300)={0x8000000, 0x0, 0x0, 0x0, {}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) 10:29:08 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x240000, 0x0) [ 149.662543][T28434] CPU: 1 PID: 28434 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 149.672697][T28434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 149.682593][T28434] Call Trace: [ 149.685715][T28434] [ 149.688493][T28434] dump_stack_lvl+0x151/0x1b7 [ 149.693009][T28434] ? io_uring_drop_tctx_refs+0x190/0x190 [ 149.698481][T28434] ? avc_denied+0x1b0/0x1b0 10:29:08 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 30) 10:29:08 executing program 4: syz_clone3(&(0x7f0000000300)={0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) 10:29:08 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xff, 0x9, 0x8}) open(0x0, 0x680002, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000740)) r2 = open(0x0, 0x680002, 0x0) r3 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000340), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000940)) r4 = open(0x0, 0x680002, 0x0) mount_setattr(r2, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000, {r4}}, 0x20) 10:29:08 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x240000, 0x0) [ 149.698508][T28434] dump_stack+0x15/0x17 [ 149.698526][T28434] should_fail+0x3c6/0x510 [ 149.698548][T28434] __should_failslab+0xa4/0xe0 [ 149.698567][T28434] ? vm_area_dup+0x26/0x230 [ 149.698585][T28434] should_failslab+0x9/0x20 10:29:08 executing program 1: syz_clone3(&(0x7f0000000300)={0x8000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) 10:29:08 executing program 4: syz_clone3(&(0x7f0000000300)={0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) 10:29:08 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 31) [ 149.698600][T28434] slab_pre_alloc_hook+0x37/0xd0 [ 149.698618][T28434] ? vm_area_dup+0x26/0x230 [ 149.698635][T28434] kmem_cache_alloc+0x44/0x200 [ 149.698652][T28434] vm_area_dup+0x26/0x230 [ 149.698668][T28434] dup_mm+0x81b/0x12c0 [ 149.698688][T28434] ? copy_init_mm+0x20/0x20 [ 149.698706][T28434] copy_mm+0x107/0x1b0 [ 149.698723][T28434] copy_process+0x12bc/0x3260 [ 149.698743][T28434] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 149.698761][T28434] ? copy_clone_args_from_user+0x744/0x830 [ 149.698790][T28434] kernel_clone+0x21e/0x9e0 [ 149.698808][T28434] ? __delayed_free_task+0x20/0x20 [ 149.698829][T28434] ? vfs_write+0x9ec/0x1110 [ 149.698849][T28434] ? create_io_thread+0x1e0/0x1e0 [ 149.698870][T28434] __x64_sys_clone3+0x376/0x3a0 [ 149.698888][T28434] ? __ia32_sys_clone+0x290/0x290 [ 149.698908][T28434] ? fput+0x1a/0x20 [ 149.698923][T28434] ? debug_smp_processor_id+0x17/0x20 [ 149.698941][T28434] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 149.698961][T28434] ? exit_to_user_mode_prepare+0x39/0xa0 [ 149.698979][T28434] do_syscall_64+0x3d/0xb0 [ 149.698996][T28434] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 149.699015][T28434] RIP: 0033:0x7f52511e2ae9 [ 149.699030][T28434] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 149.699047][T28434] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 149.699068][T28434] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 149.699081][T28434] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 149.699094][T28434] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 149.699107][T28434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 149.699118][T28434] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 149.699133][T28434] [ 149.755511][T28461] FAULT_INJECTION: forcing a failure. [ 149.755511][T28461] name failslab, interval 1, probability 0, space 0, times 0 [ 149.755540][T28461] CPU: 1 PID: 28461 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 149.755562][T28461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 149.755573][T28461] Call Trace: [ 149.755578][T28461] [ 149.755585][T28461] dump_stack_lvl+0x151/0x1b7 [ 149.755610][T28461] ? io_uring_drop_tctx_refs+0x190/0x190 [ 149.755629][T28461] ? avc_denied+0x1b0/0x1b0 [ 149.755646][T28461] dump_stack+0x15/0x17 [ 149.755662][T28461] should_fail+0x3c6/0x510 [ 149.755682][T28461] __should_failslab+0xa4/0xe0 [ 149.755701][T28461] ? vm_area_dup+0x26/0x230 [ 149.755719][T28461] should_failslab+0x9/0x20 [ 149.755736][T28461] slab_pre_alloc_hook+0x37/0xd0 [ 149.755754][T28461] ? vm_area_dup+0x26/0x230 [ 149.755771][T28461] kmem_cache_alloc+0x44/0x200 [ 149.755801][T28461] vm_area_dup+0x26/0x230 [ 149.755820][T28461] dup_mm+0x81b/0x12c0 [ 149.755841][T28461] ? copy_init_mm+0x20/0x20 [ 149.755861][T28461] copy_mm+0x107/0x1b0 [ 149.755880][T28461] copy_process+0x12bc/0x3260 [ 149.755901][T28461] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 149.755919][T28461] ? copy_clone_args_from_user+0x744/0x830 [ 149.755941][T28461] kernel_clone+0x21e/0x9e0 [ 149.755958][T28461] ? __delayed_free_task+0x20/0x20 [ 149.755977][T28461] ? vfs_write+0x9ec/0x1110 [ 149.755996][T28461] ? create_io_thread+0x1e0/0x1e0 [ 149.756016][T28461] __x64_sys_clone3+0x376/0x3a0 [ 149.756035][T28461] ? __ia32_sys_clone+0x290/0x290 [ 149.756054][T28461] ? fput+0x1a/0x20 [ 149.756071][T28461] ? debug_smp_processor_id+0x17/0x20 [ 149.756090][T28461] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 149.756111][T28461] ? exit_to_user_mode_prepare+0x39/0xa0 [ 149.756130][T28461] do_syscall_64+0x3d/0xb0 [ 149.756147][T28461] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 149.756166][T28461] RIP: 0033:0x7f52511e2ae9 [ 149.756181][T28461] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 149.756196][T28461] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 149.756218][T28461] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 149.756232][T28461] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 149.756245][T28461] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 149.756257][T28461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 149.756269][T28461] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 149.756284][T28461] [ 149.798803][T28470] FAULT_INJECTION: forcing a failure. [ 149.798803][T28470] name failslab, interval 1, probability 0, space 0, times 0 [ 149.798832][T28470] CPU: 1 PID: 28470 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 149.798854][T28470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 149.798865][T28470] Call Trace: [ 149.798871][T28470] [ 149.798877][T28470] dump_stack_lvl+0x151/0x1b7 [ 149.798902][T28470] ? io_uring_drop_tctx_refs+0x190/0x190 [ 149.798923][T28470] dump_stack+0x15/0x17 [ 149.798937][T28470] should_fail+0x3c6/0x510 [ 149.798955][T28470] __should_failslab+0xa4/0xe0 [ 149.798973][T28470] ? anon_vma_clone+0x9a/0x500 [ 149.798991][T28470] should_failslab+0x9/0x20 [ 149.799007][T28470] slab_pre_alloc_hook+0x37/0xd0 [ 149.799025][T28470] ? anon_vma_clone+0x9a/0x500 [ 149.799043][T28470] kmem_cache_alloc+0x44/0x200 [ 149.799061][T28470] anon_vma_clone+0x9a/0x500 [ 149.799080][T28470] anon_vma_fork+0x91/0x4e0 [ 149.799097][T28470] ? anon_vma_name+0x4c/0x70 [ 149.799115][T28470] ? vm_area_dup+0x17a/0x230 [ 149.799134][T28470] dup_mm+0x8c5/0x12c0 [ 149.799153][T28470] ? copy_init_mm+0x20/0x20 [ 149.799171][T28470] copy_mm+0x107/0x1b0 [ 149.799188][T28470] copy_process+0x12bc/0x3260 [ 149.799209][T28470] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 149.799228][T28470] ? copy_clone_args_from_user+0x744/0x830 [ 149.799248][T28470] kernel_clone+0x21e/0x9e0 [ 149.799265][T28470] ? __delayed_free_task+0x20/0x20 [ 149.799284][T28470] ? vfs_write+0x9ec/0x1110 [ 149.799302][T28470] ? create_io_thread+0x1e0/0x1e0 [ 149.799320][T28470] __x64_sys_clone3+0x376/0x3a0 [ 149.799342][T28470] ? __ia32_sys_clone+0x290/0x290 [ 149.799363][T28470] ? fput+0x1a/0x20 [ 149.799381][T28470] ? debug_smp_processor_id+0x17/0x20 [ 149.799400][T28470] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 149.799419][T28470] ? exit_to_user_mode_prepare+0x39/0xa0 [ 149.799438][T28470] do_syscall_64+0x3d/0xb0 [ 149.799455][T28470] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 149.799472][T28470] RIP: 0033:0x7f52511e2ae9 [ 149.799487][T28470] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 149.799501][T28470] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 149.799523][T28470] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 10:29:09 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x42442, 0x0) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280), 0x101, 0x0) sendmsg$WG_CMD_GET_DEVICE(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0004290b190369bd7000fbdbdf250000000008000700f8ff000006000600"], 0x24}, 0x1, 0x0, 0x0, 0x180}, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg2\x00', 0x0}) (async) process_vm_readv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x18, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x800, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x80a0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x90) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000080)) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) (async) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000500)={'vxcan1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000b40)={'wg2\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000b80)={'wg2\x00', 0x0}) (async) getsockname$packet(r1, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000c00)=0x14) r9 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r9, 0x81f8943c, &(0x7f0000000540)) dup2(r9, r3) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r4, &(0x7f0000000ec0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000e80)={&(0x7f0000000c40)={0x224, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x224}, 0x1, 0x0, 0x0, 0x40040}, 0x4c001) (async) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000740)={0x0, 0x3, 0x3}) fcntl$addseals(r3, 0x409, 0x8) 10:29:09 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xff, 0x9, 0x8}) open(0x0, 0x680002, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000740)) r2 = open(0x0, 0x680002, 0x0) r3 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000340), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000940)) mount_setattr(r2, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000}, 0x20) 10:29:09 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x240000, 0x0) 10:29:09 executing program 1: syz_clone3(&(0x7f0000000300)={0x8000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) 10:29:09 executing program 4: syz_clone3(&(0x7f0000000300)={0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) 10:29:09 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 32) [ 149.799536][T28470] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 149.799549][T28470] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 149.799561][T28470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 149.799571][T28470] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 149.799587][T28470] 10:29:09 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_pressure(r0, &(0x7f0000000040)='io.pressure\x00', 0x2, 0x0) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:09 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xff, 0x9, 0x8}) open(0x0, 0x680002, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000740)) r2 = open(0x0, 0x680002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000340), 0x2, 0x0) mount_setattr(r2, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000}, 0x20) 10:29:09 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x42442, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280), 0x101, 0x0) sendmsg$WG_CMD_GET_DEVICE(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0004290b190369bd7000fbdbdf250000000008000700f8ff000006000600"], 0x24}, 0x1, 0x0, 0x0, 0x180}, 0x4) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg2\x00', 0x0}) (async) process_vm_readv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x18, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x800, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x80a0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x90) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000080)) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) (async) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000500)={'vxcan1\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000b40)={'wg2\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000b80)={'wg2\x00', 0x0}) (async) getsockname$packet(r1, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000c00)=0x14) r9 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r9, 0x81f8943c, &(0x7f0000000540)) (async) dup2(r9, r3) (async) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r4, &(0x7f0000000ec0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000e80)={&(0x7f0000000c40)={0x224, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x224}, 0x1, 0x0, 0x0, 0x40040}, 0x4c001) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000740)={0x0, 0x3, 0x3}) fcntl$addseals(r3, 0x409, 0x8) 10:29:09 executing program 1: syz_clone3(&(0x7f0000000300)={0x8000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:09 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_pressure(r0, &(0x7f0000000040)='io.pressure\x00', 0x2, 0x0) (async) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) [ 150.516799][T28482] FAULT_INJECTION: forcing a failure. [ 150.516799][T28482] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 150.548337][T28482] CPU: 1 PID: 28482 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 150.558506][T28482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 10:29:09 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_pressure(r0, &(0x7f0000000040)='io.pressure\x00', 0x2, 0x0) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_pressure(r0, &(0x7f0000000040)='io.pressure\x00', 0x2, 0x0) (async) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) 10:29:09 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x42041, 0x0) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) [ 150.568396][T28482] Call Trace: [ 150.571514][T28482] [ 150.574294][T28482] dump_stack_lvl+0x151/0x1b7 [ 150.578813][T28482] ? io_uring_drop_tctx_refs+0x190/0x190 [ 150.578845][T28482] dump_stack+0x15/0x17 [ 150.578863][T28482] should_fail+0x3c6/0x510 [ 150.578886][T28482] should_fail_alloc_page+0x5a/0x80 [ 150.578906][T28482] prepare_alloc_pages+0x15c/0x700 [ 150.578927][T28482] ? __alloc_pages_bulk+0xf50/0xf50 [ 150.578946][T28482] __alloc_pages+0x138/0x5e0 [ 150.578964][T28482] ? zone_watermark_fast+0x220/0x220 10:29:09 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_pressure(r0, &(0x7f0000000040)='io.pressure\x00', 0x2, 0x0) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:09 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_pressure(r0, &(0x7f0000000040)='io.pressure\x00', 0x2, 0x0) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) [ 150.578981][T28482] ? __alloc_pages+0x206/0x5e0 [ 150.578997][T28482] ? stack_trace_save+0x1c0/0x1c0 [ 150.579016][T28482] ? __kasan_check_write+0x14/0x20 [ 150.579033][T28482] ? _raw_spin_lock+0xa4/0x1b0 [ 150.579049][T28482] __pmd_alloc+0xb1/0x550 [ 150.579065][T28482] ? __pud_alloc+0x260/0x260 [ 150.644997][T28482] ? __pud_alloc+0x213/0x260 [ 150.649408][T28482] ? do_handle_mm_fault+0x2330/0x2330 [ 150.654621][T28482] ? __stack_depot_save+0x34/0x470 [ 150.659561][T28482] ? anon_vma_clone+0x9a/0x500 [ 150.664168][T28482] copy_page_range+0x2b3d/0x2f90 [ 150.669545][T28482] ? __kasan_slab_alloc+0xb1/0xe0 [ 150.674418][T28482] ? slab_post_alloc_hook+0x53/0x2c0 [ 150.679526][T28482] ? dup_mm+0x8c5/0x12c0 [ 150.683600][T28482] ? copy_mm+0x107/0x1b0 [ 150.687679][T28482] ? copy_process+0x12bc/0x3260 [ 150.692453][T28482] ? __x64_sys_clone3+0x376/0x3a0 [ 150.697340][T28482] ? do_syscall_64+0x3d/0xb0 [ 150.701826][T28482] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 150.707733][T28482] ? pfn_valid+0x1e0/0x1e0 [ 150.711988][T28482] ? rwsem_write_trylock+0x15b/0x290 [ 150.717192][T28482] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 150.723437][T28482] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 150.728992][T28482] ? __rb_insert_augmented+0x5de/0x610 [ 150.734292][T28482] dup_mm+0xadc/0x12c0 [ 150.738195][T28482] ? copy_init_mm+0x20/0x20 [ 150.742620][T28482] copy_mm+0x107/0x1b0 [ 150.746532][T28482] copy_process+0x12bc/0x3260 [ 150.751041][T28482] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 150.756071][T28482] ? copy_clone_args_from_user+0x744/0x830 [ 150.761711][T28482] kernel_clone+0x21e/0x9e0 [ 150.766052][T28482] ? __delayed_free_task+0x20/0x20 [ 150.771086][T28482] ? vfs_write+0x9ec/0x1110 [ 150.775425][T28482] ? create_io_thread+0x1e0/0x1e0 [ 150.780288][T28482] __x64_sys_clone3+0x376/0x3a0 [ 150.784974][T28482] ? __ia32_sys_clone+0x290/0x290 [ 150.789953][T28482] ? fput+0x1a/0x20 [ 150.793684][T28482] ? debug_smp_processor_id+0x17/0x20 [ 150.799056][T28482] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 150.805894][T28482] ? exit_to_user_mode_prepare+0x39/0xa0 [ 150.811368][T28482] do_syscall_64+0x3d/0xb0 [ 150.815602][T28482] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 150.821332][T28482] RIP: 0033:0x7f52511e2ae9 [ 150.825584][T28482] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 150.845120][T28482] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 150.853364][T28482] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 150.861174][T28482] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 10:29:09 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xff, 0x9, 0x8}) open(0x0, 0x680002, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000740)) r2 = open(0x0, 0x680002, 0x0) mount_setattr(r2, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000}, 0x20) 10:29:09 executing program 4: syz_clone3(&(0x7f0000000300)={0x8000000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) 10:29:09 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 33) 10:29:09 executing program 5: r0 = getpgrp(0xffffffffffffffff) r1 = getpgrp(r0) process_vm_readv(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:09 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x42041, 0x0) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:09 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x42442, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280), 0x101, 0x0) sendmsg$WG_CMD_GET_DEVICE(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0004290b190369bd7000fbdbdf250000000008000700f8ff000006000600"], 0x24}, 0x1, 0x0, 0x0, 0x180}, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg2\x00', 0x0}) process_vm_readv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x18, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x800, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x80a0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x90) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000080)) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000500)={'vxcan1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000b40)={'wg2\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000b80)={'wg2\x00', 0x0}) getsockname$packet(r1, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000c00)=0x14) r9 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r9, 0x81f8943c, &(0x7f0000000540)) dup2(r9, r3) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r4, &(0x7f0000000ec0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000e80)={&(0x7f0000000c40)={0x224, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x224}, 0x1, 0x0, 0x0, 0x40040}, 0x4c001) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000740)={0x0, 0x3, 0x3}) fcntl$addseals(r3, 0x409, 0x8) 10:29:09 executing program 5: r0 = getpgrp(0xffffffffffffffff) r1 = getpgrp(r0) process_vm_readv(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) (async) getpgrp(r0) (async) process_vm_readv(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) [ 150.869249][T28482] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 150.877063][T28482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 150.884869][T28482] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 150.892684][T28482] 10:29:09 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xff, 0x9, 0x8}) open(0x0, 0x680002, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000740)) mount_setattr(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000}, 0x20) [ 150.937428][T28530] FAULT_INJECTION: forcing a failure. [ 150.937428][T28530] name failslab, interval 1, probability 0, space 0, times 0 [ 150.956725][T28530] CPU: 0 PID: 28530 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 150.966982][T28530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 150.976877][T28530] Call Trace: [ 150.980003][T28530] [ 150.982777][T28530] dump_stack_lvl+0x151/0x1b7 [ 150.987650][T28530] ? io_uring_drop_tctx_refs+0x190/0x190 [ 150.993120][T28530] dump_stack+0x15/0x17 [ 150.997112][T28530] should_fail+0x3c6/0x510 [ 151.001365][T28530] __should_failslab+0xa4/0xe0 [ 151.005962][T28530] ? anon_vma_fork+0x1df/0x4e0 [ 151.010569][T28530] should_failslab+0x9/0x20 [ 151.014903][T28530] slab_pre_alloc_hook+0x37/0xd0 [ 151.019675][T28530] ? anon_vma_fork+0x1df/0x4e0 [ 151.024274][T28530] kmem_cache_alloc+0x44/0x200 [ 151.028877][T28530] anon_vma_fork+0x1df/0x4e0 [ 151.033396][T28530] dup_mm+0x8c5/0x12c0 10:29:09 executing program 1: r0 = syz_clone3(&(0x7f0000000200)={0x45090000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2c}, &(0x7f00000000c0)=""/56, 0x38, &(0x7f0000000100)=""/178, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) read$FUSE(0xffffffffffffffff, &(0x7f0000000280)={0x2020}, 0x2020) process_vm_readv(r0, 0x0, 0x0, 0x0, 0xfffffea6, 0x0) 10:29:09 executing program 4: syz_clone3(&(0x7f0000000300)={0x8000000, 0x0, 0x0, &(0x7f0000000080), {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) 10:29:09 executing program 5: r0 = getpgrp(0xffffffffffffffff) r1 = getpgrp(r0) process_vm_readv(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:09 executing program 4: syz_clone3(&(0x7f0000000300)={0x8000000, 0x0, 0x0, 0x0, {0x8}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) 10:29:09 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x42041, 0x0) (async) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:09 executing program 4: syz_clone3(&(0x7f0000000300)={0x8000000, 0x0, 0x0, 0x0, {}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) [ 151.037305][T28530] ? copy_init_mm+0x20/0x20 [ 151.041643][T28530] copy_mm+0x107/0x1b0 [ 151.045628][T28530] copy_process+0x12bc/0x3260 [ 151.050146][T28530] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 151.055090][T28530] ? copy_clone_args_from_user+0x744/0x830 [ 151.060734][T28530] kernel_clone+0x21e/0x9e0 [ 151.065071][T28530] ? __delayed_free_task+0x20/0x20 [ 151.070010][T28530] ? vfs_write+0x9ec/0x1110 [ 151.074347][T28530] ? create_io_thread+0x1e0/0x1e0 [ 151.079215][T28530] __x64_sys_clone3+0x376/0x3a0 [ 151.083896][T28530] ? __ia32_sys_clone+0x290/0x290 [ 151.088756][T28530] ? fput+0x1a/0x20 [ 151.092400][T28530] ? debug_smp_processor_id+0x17/0x20 [ 151.097610][T28530] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 151.103856][T28530] ? exit_to_user_mode_prepare+0x39/0xa0 [ 151.109354][T28530] do_syscall_64+0x3d/0xb0 [ 151.113577][T28530] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 151.119313][T28530] RIP: 0033:0x7f52511e2ae9 [ 151.123560][T28530] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 151.143000][T28530] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 151.151252][T28530] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 151.159056][T28530] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 151.166867][T28530] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 151.174678][T28530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:29:09 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 34) 10:29:09 executing program 3: process_vm_readv(0x0, &(0x7f0000000340), 0x8, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/73, 0x4d}, {0x0}], 0x2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 10:29:09 executing program 4: syz_clone3(&(0x7f0000000300)={0x8000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f00000001c0)=""/202, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) 10:29:09 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xff, 0x9, 0x8}) open(0x0, 0x680002, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) mount_setattr(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000}, 0x20) 10:29:09 executing program 1: r0 = syz_clone3(&(0x7f0000000200)={0x45090000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2c}, &(0x7f00000000c0)=""/56, 0x38, &(0x7f0000000100)=""/178, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) read$FUSE(0xffffffffffffffff, &(0x7f0000000280)={0x2020}, 0x2020) process_vm_readv(r0, 0x0, 0x0, 0x0, 0xfffffea6, 0x0) 10:29:09 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x8}, 0x8) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:09 executing program 3: process_vm_readv(0x0, &(0x7f0000000340), 0x8, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/73, 0x4d}, {0x0}], 0x2, 0x0) (async) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 10:29:09 executing program 1: r0 = syz_clone3(&(0x7f0000000200)={0x45090000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2c}, &(0x7f00000000c0)=""/56, 0x38, &(0x7f0000000100)=""/178, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) read$FUSE(0xffffffffffffffff, &(0x7f0000000280)={0x2020}, 0x2020) process_vm_readv(r0, 0x0, 0x0, 0x0, 0xfffffea6, 0x0) [ 151.182490][T28530] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 151.190306][T28530] [ 151.207775][T28559] FAULT_INJECTION: forcing a failure. [ 151.207775][T28559] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 151.221894][T28559] CPU: 0 PID: 28559 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 10:29:09 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xff, 0x9, 0x8}) open(0x0, 0x680002, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) mount_setattr(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000}, 0x20) 10:29:09 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x8}, 0x8) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:09 executing program 4: syz_clone3(&(0x7f0000000300)={0x8000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) [ 151.232063][T28559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 151.241945][T28559] Call Trace: [ 151.245068][T28559] [ 151.247842][T28559] dump_stack_lvl+0x151/0x1b7 [ 151.252445][T28559] ? io_uring_drop_tctx_refs+0x190/0x190 [ 151.257911][T28559] ? stack_trace_save+0x113/0x1c0 [ 151.262770][T28559] ? unwind_get_return_address+0x4d/0x90 [ 151.268242][T28559] dump_stack+0x15/0x17 [ 151.272231][T28559] should_fail+0x3c6/0x510 [ 151.276487][T28559] should_fail_alloc_page+0x5a/0x80 [ 151.281513][T28559] prepare_alloc_pages+0x15c/0x700 10:29:09 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x8}, 0x8) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 151.287075][T28559] ? __alloc_pages_bulk+0xf50/0xf50 [ 151.292108][T28559] __alloc_pages+0x138/0x5e0 [ 151.296534][T28559] ? stack_trace_save+0x1c0/0x1c0 [ 151.301403][T28559] ? zone_watermark_fast+0x220/0x220 [ 151.306518][T28559] get_zeroed_page+0x19/0x40 [ 151.310947][T28559] __pud_alloc+0x8b/0x260 [ 151.315105][T28559] ? stack_trace_snprint+0xf0/0xf0 [ 151.320057][T28559] ? do_handle_mm_fault+0x2330/0x2330 [ 151.325436][T28559] ? __stack_depot_save+0x34/0x470 [ 151.330379][T28559] ? anon_vma_clone+0x9a/0x500 [ 151.334981][T28559] copy_page_range+0x2bcf/0x2f90 [ 151.339751][T28559] ? __kasan_slab_alloc+0xb1/0xe0 [ 151.344617][T28559] ? slab_post_alloc_hook+0x53/0x2c0 [ 151.349742][T28559] ? dup_mm+0x8c5/0x12c0 [ 151.353812][T28559] ? copy_mm+0x107/0x1b0 [ 151.357895][T28559] ? copy_process+0x12bc/0x3260 [ 151.362578][T28559] ? kernel_clone+0x21e/0x9e0 [ 151.367092][T28559] ? __x64_sys_clone3+0x376/0x3a0 [ 151.371947][T28559] ? do_syscall_64+0x3d/0xb0 [ 151.376373][T28559] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 151.382282][T28559] ? pfn_valid+0x1e0/0x1e0 [ 151.386529][T28559] ? rwsem_write_trylock+0x15b/0x290 [ 151.391651][T28559] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 151.397901][T28559] dup_mm+0xadc/0x12c0 [ 151.401803][T28559] ? copy_init_mm+0x20/0x20 [ 151.406146][T28559] copy_mm+0x107/0x1b0 [ 151.410051][T28559] copy_process+0x12bc/0x3260 [ 151.414564][T28559] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 151.419516][T28559] ? copy_clone_args_from_user+0x744/0x830 [ 151.425155][T28559] kernel_clone+0x21e/0x9e0 [ 151.429493][T28559] ? __delayed_free_task+0x20/0x20 [ 151.434435][T28559] ? vfs_write+0x9ec/0x1110 [ 151.438783][T28559] ? create_io_thread+0x1e0/0x1e0 [ 151.443637][T28559] __x64_sys_clone3+0x376/0x3a0 [ 151.448327][T28559] ? __ia32_sys_clone+0x290/0x290 [ 151.453186][T28559] ? fput+0x1a/0x20 [ 151.456833][T28559] ? debug_smp_processor_id+0x17/0x20 [ 151.462038][T28559] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 151.467950][T28559] ? exit_to_user_mode_prepare+0x39/0xa0 [ 151.473409][T28559] do_syscall_64+0x3d/0xb0 [ 151.477677][T28559] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 151.483396][T28559] RIP: 0033:0x7f52511e2ae9 [ 151.487643][T28559] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 151.507087][T28559] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 151.515328][T28559] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 151.523140][T28559] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 151.530952][T28559] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 10:29:10 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 35) 10:29:10 executing program 1: syz_clone3(&(0x7f0000000200)={0x45090000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2c}, &(0x7f00000000c0)=""/56, 0x38, &(0x7f0000000100)=""/178, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) read$FUSE(0xffffffffffffffff, &(0x7f0000000280)={0x2020}, 0x2020) 10:29:10 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) process_vm_readv(r0, 0x0, 0x4c, 0x0, 0x0, 0x0) 10:29:10 executing program 4: syz_clone3(&(0x7f0000000300)={0x8000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:10 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xff, 0x9, 0x8}) open(0x0, 0x680002, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) open(0x0, 0x680002, 0x0) mount_setattr(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000}, 0x20) 10:29:10 executing program 3: process_vm_readv(0x0, &(0x7f0000000340), 0x8, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/73, 0x4d}, {0x0}], 0x2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 151.538769][T28559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 151.546572][T28559] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 151.554385][T28559] [ 151.568604][T28580] FAULT_INJECTION: forcing a failure. [ 151.568604][T28580] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 151.581878][T28580] CPU: 0 PID: 28580 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 151.592029][T28580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 151.601926][T28580] Call Trace: [ 151.605044][T28580] [ 151.607825][T28580] dump_stack_lvl+0x151/0x1b7 [ 151.612335][T28580] ? io_uring_drop_tctx_refs+0x190/0x190 [ 151.617812][T28580] dump_stack+0x15/0x17 [ 151.621791][T28580] should_fail+0x3c6/0x510 [ 151.626047][T28580] should_fail_alloc_page+0x5a/0x80 [ 151.631085][T28580] prepare_alloc_pages+0x15c/0x700 [ 151.636027][T28580] ? __alloc_pages_bulk+0xf50/0xf50 [ 151.641071][T28580] ? __alloc_pages+0x5e0/0x5e0 [ 151.645661][T28580] __alloc_pages+0x138/0x5e0 [ 151.650091][T28580] ? zone_watermark_fast+0x220/0x220 [ 151.655206][T28580] ? __alloc_pages+0x206/0x5e0 [ 151.659807][T28580] ? zone_watermark_fast+0x220/0x220 [ 151.664925][T28580] ? __kasan_check_write+0x14/0x20 [ 151.669873][T28580] ? _raw_spin_lock+0xa4/0x1b0 [ 151.674476][T28580] pte_alloc_one+0x73/0x1b0 [ 151.678811][T28580] ? pfn_modify_allowed+0x2f0/0x2f0 [ 151.683855][T28580] ? __pmd_alloc+0x48d/0x550 [ 151.688273][T28580] __pte_alloc+0x86/0x350 [ 151.692442][T28580] ? __pud_alloc+0x260/0x260 [ 151.696865][T28580] ? __pud_alloc+0x213/0x260 [ 151.701291][T28580] ? free_pgtables+0x280/0x280 [ 151.705891][T28580] ? do_handle_mm_fault+0x2330/0x2330 [ 151.711107][T28580] ? __stack_depot_save+0x34/0x470 [ 151.716187][T28580] ? anon_vma_clone+0x9a/0x500 [ 151.720749][T28580] copy_page_range+0x28a8/0x2f90 [ 151.725508][T28580] ? __kasan_slab_alloc+0xb1/0xe0 [ 151.730366][T28580] ? slab_post_alloc_hook+0x53/0x2c0 [ 151.735489][T28580] ? copy_process+0x12bc/0x3260 [ 151.740174][T28580] ? __x64_sys_clone3+0x376/0x3a0 [ 151.745046][T28580] ? do_syscall_64+0x3d/0xb0 [ 151.749460][T28580] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 151.755364][T28580] ? pfn_valid+0x1e0/0x1e0 [ 151.759622][T28580] ? rwsem_write_trylock+0x15b/0x290 [ 151.764735][T28580] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 151.770990][T28580] dup_mm+0xadc/0x12c0 [ 151.774892][T28580] ? copy_init_mm+0x20/0x20 [ 151.779230][T28580] copy_mm+0x107/0x1b0 [ 151.783145][T28580] copy_process+0x12bc/0x3260 [ 151.787649][T28580] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 151.792604][T28580] ? copy_clone_args_from_user+0x744/0x830 [ 151.798326][T28580] kernel_clone+0x21e/0x9e0 [ 151.802661][T28580] ? __delayed_free_task+0x20/0x20 [ 151.807608][T28580] ? vfs_write+0x9ec/0x1110 [ 151.811949][T28580] ? create_io_thread+0x1e0/0x1e0 [ 151.816810][T28580] __x64_sys_clone3+0x376/0x3a0 [ 151.821500][T28580] ? __ia32_sys_clone+0x290/0x290 [ 151.826359][T28580] ? fput+0x1a/0x20 [ 151.830006][T28580] ? debug_smp_processor_id+0x17/0x20 [ 151.835211][T28580] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 151.841120][T28580] ? exit_to_user_mode_prepare+0x39/0xa0 [ 151.846581][T28580] do_syscall_64+0x3d/0xb0 [ 151.850831][T28580] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 151.856645][T28580] RIP: 0033:0x7f52511e2ae9 [ 151.860902][T28580] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 151.880340][T28580] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 10:29:10 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) process_vm_readv(r0, 0x0, 0x4c, 0x0, 0x0, 0x0) (async) process_vm_readv(r0, 0x0, 0x4c, 0x0, 0x0, 0x0) [ 151.888586][T28580] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 151.896398][T28580] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 151.904213][T28580] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 151.912018][T28580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 151.919830][T28580] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 151.927644][T28580] 10:29:10 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xff, 0x9, 0x8}) open(0x0, 0x680002, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) mount_setattr(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000}, 0x20) 10:29:10 executing program 1: syz_clone3(&(0x7f0000000200)={0x45090000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2c}, &(0x7f00000000c0)=""/56, 0x38, &(0x7f0000000100)=""/178, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) 10:29:10 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 36) 10:29:10 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000400)={{0x0, 0x9, 0x6, 0x1b, 0x3, 0x10001, 0x6, 0x9, 0x7, 0x8, 0x1, 0x6, 0x2b7452e0, 0x0, 0x6}}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r2, 0x0, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7ff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x4000000) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r2, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x84}, 0x4004) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001e80)={{r0, 0x80000000, 0xab0, 0x8000, 0x1, 0x4, 0x9d5, 0x8, 0xfffc0000, 0x5, 0x32a9, 0x1, 0xe3, 0x1}}) 10:29:10 executing program 4: syz_clone3(&(0x7f0000000300)={0x8000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x58) [ 151.942181][ T30] audit: type=1400 audit(1691922550.439:129): avc: denied { unlink } for pid=82 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 10:29:10 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) process_vm_readv(r0, 0x0, 0x4c, 0x0, 0x0, 0x0) 10:29:10 executing program 4: process_vm_readv(0x0, &(0x7f0000000340), 0x8, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/73, 0x4d}, {0x0}], 0x2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 10:29:10 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000400)={{0x0, 0x9, 0x6, 0x1b, 0x3, 0x10001, 0x6, 0x9, 0x7, 0x8, 0x1, 0x6, 0x2b7452e0, 0x0, 0x6}}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r2, 0x0, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7ff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x4000000) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r2, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x84}, 0x4004) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001e80)={{r0, 0x80000000, 0xab0, 0x8000, 0x1, 0x4, 0x9d5, 0x8, 0xfffc0000, 0x5, 0x32a9, 0x1, 0xe3, 0x1}}) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000400)={{0x0, 0x9, 0x6, 0x1b, 0x3, 0x10001, 0x6, 0x9, 0x7, 0x8, 0x1, 0x6, 0x2b7452e0, 0x0, 0x6}}) (async) pipe(&(0x7f0000000000)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r2, 0x0, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7ff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x4000000) (async) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r2, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x84}, 0x4004) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001e80)={{r0, 0x80000000, 0xab0, 0x8000, 0x1, 0x4, 0x9d5, 0x8, 0xfffc0000, 0x5, 0x32a9, 0x1, 0xe3, 0x1}}) (async) 10:29:10 executing program 1: syz_clone3(0x0, 0x0) 10:29:10 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xff, 0x9, 0x8}) open(0x0, 0x680002, 0x0) mount_setattr(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000}, 0x20) 10:29:10 executing program 5: flistxattr(0xffffffffffffffff, &(0x7f0000000040)=""/253, 0xfd) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) 10:29:10 executing program 5: flistxattr(0xffffffffffffffff, &(0x7f0000000040)=""/253, 0xfd) (async) flistxattr(0xffffffffffffffff, &(0x7f0000000040)=""/253, 0xfd) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) 10:29:10 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xff, 0x9, 0x8}) mount_setattr(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000}, 0x20) 10:29:10 executing program 4: process_vm_readv(0x0, &(0x7f0000000340), 0x8, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/73, 0x4d}, {0x0}], 0x2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 152.045370][T28607] FAULT_INJECTION: forcing a failure. [ 152.045370][T28607] name failslab, interval 1, probability 0, space 0, times 0 [ 152.078038][T28607] CPU: 1 PID: 28607 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 152.088368][T28607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 152.098262][T28607] Call Trace: [ 152.101381][T28607] [ 152.104161][T28607] dump_stack_lvl+0x151/0x1b7 [ 152.108673][T28607] ? io_uring_drop_tctx_refs+0x190/0x190 [ 152.114140][T28607] dump_stack+0x15/0x17 [ 152.118133][T28607] should_fail+0x3c6/0x510 [ 152.122385][T28607] __should_failslab+0xa4/0xe0 [ 152.126986][T28607] ? anon_vma_clone+0x9a/0x500 [ 152.131588][T28607] should_failslab+0x9/0x20 [ 152.135925][T28607] slab_pre_alloc_hook+0x37/0xd0 [ 152.140701][T28607] ? anon_vma_clone+0x9a/0x500 [ 152.145328][T28607] kmem_cache_alloc+0x44/0x200 [ 152.149909][T28607] anon_vma_clone+0x9a/0x500 [ 152.154326][T28607] anon_vma_fork+0x91/0x4e0 [ 152.158663][T28607] ? anon_vma_name+0x4c/0x70 [ 152.163090][T28607] ? vm_area_dup+0x17a/0x230 [ 152.167519][T28607] dup_mm+0x8c5/0x12c0 [ 152.171425][T28607] ? copy_init_mm+0x20/0x20 [ 152.175761][T28607] copy_mm+0x107/0x1b0 [ 152.179668][T28607] copy_process+0x12bc/0x3260 [ 152.184186][T28607] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 152.189129][T28607] ? copy_clone_args_from_user+0x744/0x830 [ 152.194770][T28607] kernel_clone+0x21e/0x9e0 [ 152.199108][T28607] ? __delayed_free_task+0x20/0x20 [ 152.204056][T28607] ? vfs_write+0x9ec/0x1110 [ 152.208396][T28607] ? create_io_thread+0x1e0/0x1e0 [ 152.213255][T28607] __x64_sys_clone3+0x376/0x3a0 [ 152.217943][T28607] ? __ia32_sys_clone+0x290/0x290 [ 152.222807][T28607] ? fput+0x1a/0x20 [ 152.226537][T28607] ? debug_smp_processor_id+0x17/0x20 [ 152.231744][T28607] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 152.237644][T28607] ? exit_to_user_mode_prepare+0x39/0xa0 [ 152.243112][T28607] do_syscall_64+0x3d/0xb0 [ 152.247366][T28607] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 152.253095][T28607] RIP: 0033:0x7f52511e2ae9 [ 152.257349][T28607] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 152.276791][T28607] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 152.285033][T28607] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 152.292850][T28607] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 152.300656][T28607] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 10:29:10 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 37) 10:29:10 executing program 1: syz_clone3(0x0, 0x0) 10:29:10 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000400)={{0x0, 0x9, 0x6, 0x1b, 0x3, 0x10001, 0x6, 0x9, 0x7, 0x8, 0x1, 0x6, 0x2b7452e0, 0x0, 0x6}}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r2, 0x0, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7ff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x4000000) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r2, 0x0, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7ff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x4000000) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r2, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x84}, 0x4004) (async) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r2, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x84}, 0x4004) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001e80)={{r0, 0x80000000, 0xab0, 0x8000, 0x1, 0x4, 0x9d5, 0x8, 0xfffc0000, 0x5, 0x32a9, 0x1, 0xe3, 0x1}}) 10:29:10 executing program 4: process_vm_readv(0x0, &(0x7f0000000340), 0x8, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/73, 0x4d}, {0x0}], 0x2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 10:29:10 executing program 5: flistxattr(0xffffffffffffffff, &(0x7f0000000040)=""/253, 0xfd) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) flistxattr(0xffffffffffffffff, &(0x7f0000000040)=""/253, 0xfd) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) (async) 10:29:10 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) open(0x0, 0x680002, 0x0) mount_setattr(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000}, 0x20) 10:29:10 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/52, 0x34}, {0x0}], 0x2, 0x0) mount_setattr(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000}, 0x20) 10:29:10 executing program 1: syz_clone3(0x0, 0x0) 10:29:10 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40), 0x0, 0x0) 10:29:10 executing program 5: r0 = syz_clone3(&(0x7f0000000240)={0x20020000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x5}, &(0x7f00000000c0)=""/86, 0x56, &(0x7f0000000140)=""/183, &(0x7f0000000200)=[0x0, 0xffffffffffffffff, 0x0, 0x0], 0x4}, 0x58) process_vm_readv(r0, &(0x7f0000000500)=[{&(0x7f00000002c0)=""/242, 0xf2}, {&(0x7f00000003c0)=""/192, 0xc0}, {&(0x7f0000000480)=""/85, 0x55}], 0x3, &(0x7f0000000880)=[{&(0x7f0000000540)=""/227, 0xe3}, {&(0x7f0000000640)=""/162, 0xa2}, {&(0x7f0000000700)=""/170, 0xaa}, {&(0x7f00000007c0)=""/154, 0x9a}], 0x4, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x3c, r1, 0x9, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x80000000}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x100}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xfbb}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2000884}, 0x800) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:10 executing program 4: process_vm_readv(0x0, &(0x7f0000000340), 0x8, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/73, 0x4d}, {0x0}], 0x2, 0x0) pipe(&(0x7f00000001c0)) [ 152.308469][T28607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 152.316279][T28607] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 152.324099][T28607] 10:29:10 executing program 4: pipe(&(0x7f00000001c0)) [ 152.373086][T28651] FAULT_INJECTION: forcing a failure. [ 152.373086][T28651] name failslab, interval 1, probability 0, space 0, times 0 [ 152.394024][T28651] CPU: 1 PID: 28651 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 152.404187][T28651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 152.414081][T28651] Call Trace: [ 152.417202][T28651] [ 152.420068][T28651] dump_stack_lvl+0x151/0x1b7 [ 152.424583][T28651] ? io_uring_drop_tctx_refs+0x190/0x190 [ 152.430050][T28651] dump_stack+0x15/0x17 [ 152.434036][T28651] should_fail+0x3c6/0x510 [ 152.438291][T28651] __should_failslab+0xa4/0xe0 [ 152.442900][T28651] ? vm_area_dup+0x26/0x230 [ 152.447232][T28651] should_failslab+0x9/0x20 [ 152.451568][T28651] slab_pre_alloc_hook+0x37/0xd0 [ 152.456339][T28651] ? vm_area_dup+0x26/0x230 [ 152.460679][T28651] kmem_cache_alloc+0x44/0x200 [ 152.465279][T28651] vm_area_dup+0x26/0x230 [ 152.469445][T28651] dup_mm+0x81b/0x12c0 [ 152.473352][T28651] ? copy_init_mm+0x20/0x20 [ 152.477692][T28651] copy_mm+0x107/0x1b0 [ 152.481599][T28651] copy_process+0x12bc/0x3260 [ 152.486125][T28651] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 152.491063][T28651] ? copy_clone_args_from_user+0x744/0x830 [ 152.496703][T28651] kernel_clone+0x21e/0x9e0 [ 152.501037][T28651] ? __delayed_free_task+0x20/0x20 [ 152.505985][T28651] ? vfs_write+0x9ec/0x1110 [ 152.510338][T28651] ? create_io_thread+0x1e0/0x1e0 [ 152.515188][T28651] __x64_sys_clone3+0x376/0x3a0 [ 152.519874][T28651] ? __ia32_sys_clone+0x290/0x290 [ 152.524733][T28651] ? fput+0x1a/0x20 [ 152.528378][T28651] ? debug_smp_processor_id+0x17/0x20 [ 152.533588][T28651] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 152.539486][T28651] ? exit_to_user_mode_prepare+0x39/0xa0 [ 152.544958][T28651] do_syscall_64+0x3d/0xb0 [ 152.549209][T28651] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 152.554939][T28651] RIP: 0033:0x7f52511e2ae9 [ 152.559191][T28651] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 152.578631][T28651] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 152.586883][T28651] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 152.594684][T28651] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 152.602497][T28651] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 152.610307][T28651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:29:11 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 38) 10:29:11 executing program 0: mount_setattr(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000}, 0x20) 10:29:11 executing program 4: pipe(&(0x7f00000001c0)) 10:29:11 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40), 0x0, 0x0) 10:29:11 executing program 1: syz_clone3(&(0x7f0000000200)={0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2c}, &(0x7f00000000c0)=""/56, 0x38, &(0x7f0000000100)=""/178, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) 10:29:11 executing program 5: r0 = syz_clone3(&(0x7f0000000240)={0x20020000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x5}, &(0x7f00000000c0)=""/86, 0x56, &(0x7f0000000140)=""/183, &(0x7f0000000200)=[0x0, 0xffffffffffffffff, 0x0, 0x0], 0x4}, 0x58) process_vm_readv(r0, &(0x7f0000000500)=[{&(0x7f00000002c0)=""/242, 0xf2}, {&(0x7f00000003c0)=""/192, 0xc0}, {&(0x7f0000000480)=""/85, 0x55}], 0x3, &(0x7f0000000880)=[{&(0x7f0000000540)=""/227, 0xe3}, {&(0x7f0000000640)=""/162, 0xa2}, {&(0x7f0000000700)=""/170, 0xaa}, {&(0x7f00000007c0)=""/154, 0x9a}], 0x4, 0x0) (async) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x3c, r1, 0x9, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x80000000}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x100}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xfbb}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2000884}, 0x800) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:11 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40), 0x0, 0x0) 10:29:11 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x9000, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000}, 0x20) [ 152.618211][T28651] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 152.626021][T28651] [ 152.668315][T28673] FAULT_INJECTION: forcing a failure. [ 152.668315][T28673] name failslab, interval 1, probability 0, space 0, times 0 [ 152.682378][T28673] CPU: 0 PID: 28673 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 152.692540][T28673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 152.702432][T28673] Call Trace: [ 152.705554][T28673] [ 152.708331][T28673] dump_stack_lvl+0x151/0x1b7 [ 152.712846][T28673] ? io_uring_drop_tctx_refs+0x190/0x190 10:29:11 executing program 4: pipe(&(0x7f00000001c0)) 10:29:11 executing program 1: syz_clone3(&(0x7f0000000200)={0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2c}, &(0x7f00000000c0)=""/56, 0x38, &(0x7f0000000100)=""/178, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) 10:29:11 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={0x10000a, 0x100080, 0x40000}, 0x20) 10:29:11 executing program 1: syz_clone3(&(0x7f0000000200)={0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2c}, &(0x7f00000000c0)=""/56, 0x38, &(0x7f0000000100)=""/178, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) [ 152.718318][T28673] dump_stack+0x15/0x17 [ 152.722309][T28673] should_fail+0x3c6/0x510 [ 152.726561][T28673] __should_failslab+0xa4/0xe0 [ 152.731163][T28673] ? vm_area_dup+0x26/0x230 [ 152.735495][T28673] should_failslab+0x9/0x20 [ 152.739835][T28673] slab_pre_alloc_hook+0x37/0xd0 [ 152.744610][T28673] ? vm_area_dup+0x26/0x230 [ 152.748951][T28673] kmem_cache_alloc+0x44/0x200 [ 152.753550][T28673] vm_area_dup+0x26/0x230 [ 152.757714][T28673] dup_mm+0x81b/0x12c0 [ 152.761623][T28673] ? copy_init_mm+0x20/0x20 [ 152.765975][T28673] copy_mm+0x107/0x1b0 [ 152.769863][T28673] copy_process+0x12bc/0x3260 [ 152.774391][T28673] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 152.779332][T28673] ? copy_clone_args_from_user+0x744/0x830 [ 152.785073][T28673] kernel_clone+0x21e/0x9e0 [ 152.789413][T28673] ? __delayed_free_task+0x20/0x20 [ 152.794358][T28673] ? vfs_write+0x9ec/0x1110 [ 152.798696][T28673] ? create_io_thread+0x1e0/0x1e0 [ 152.803561][T28673] __x64_sys_clone3+0x376/0x3a0 [ 152.808243][T28673] ? __ia32_sys_clone+0x290/0x290 [ 152.813189][T28673] ? fput+0x1a/0x20 [ 152.816835][T28673] ? debug_smp_processor_id+0x17/0x20 [ 152.822050][T28673] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 152.828032][T28673] ? exit_to_user_mode_prepare+0x39/0xa0 [ 152.833505][T28673] do_syscall_64+0x3d/0xb0 [ 152.837751][T28673] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 152.843478][T28673] RIP: 0033:0x7f52511e2ae9 [ 152.847732][T28673] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 10:29:11 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 39) 10:29:11 executing program 1: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, &(0x7f0000000040), &(0x7f0000000080), {0x2c}, &(0x7f00000000c0)=""/56, 0x38, &(0x7f0000000100)=""/178, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) 10:29:11 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000100), 0x8, &(0x7f0000000040)) 10:29:11 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:29:11 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/73, 0x49}, {0x0}], 0x2, 0x0) pipe(&(0x7f00000001c0)) 10:29:11 executing program 5: r0 = syz_clone3(&(0x7f0000000240)={0x20020000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x5}, &(0x7f00000000c0)=""/86, 0x56, &(0x7f0000000140)=""/183, &(0x7f0000000200)=[0x0, 0xffffffffffffffff, 0x0, 0x0], 0x4}, 0x58) process_vm_readv(r0, &(0x7f0000000500)=[{&(0x7f00000002c0)=""/242, 0xf2}, {&(0x7f00000003c0)=""/192, 0xc0}, {&(0x7f0000000480)=""/85, 0x55}], 0x3, &(0x7f0000000880)=[{&(0x7f0000000540)=""/227, 0xe3}, {&(0x7f0000000640)=""/162, 0xa2}, {&(0x7f0000000700)=""/170, 0xaa}, {&(0x7f00000007c0)=""/154, 0x9a}], 0x4, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x3c, r1, 0x9, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x80000000}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x100}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xfbb}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2000884}, 0x800) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:11 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 152.867174][T28673] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 152.875417][T28673] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 152.883228][T28673] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 152.891040][T28673] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 152.898863][T28673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 152.906660][T28673] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 152.914476][T28673] 10:29:11 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000100), 0x8, &(0x7f0000000040)) 10:29:11 executing program 1: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, &(0x7f0000000080), {0x2c}, &(0x7f00000000c0)=""/56, 0x38, &(0x7f0000000100)=""/178, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) 10:29:11 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x88c00, 0x10}, 0x18) getpgrp(0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 10:29:11 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/73, 0x49}, {0x0}], 0x2, 0x0) pipe(&(0x7f00000001c0)) 10:29:11 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 152.941711][T28696] FAULT_INJECTION: forcing a failure. [ 152.941711][T28696] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 152.977568][T28696] CPU: 0 PID: 28696 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 152.987817][T28696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 152.997711][T28696] Call Trace: [ 153.000836][T28696] [ 153.003611][T28696] dump_stack_lvl+0x151/0x1b7 [ 153.008126][T28696] ? io_uring_drop_tctx_refs+0x190/0x190 [ 153.013595][T28696] dump_stack+0x15/0x17 [ 153.017581][T28696] should_fail+0x3c6/0x510 [ 153.021854][T28696] should_fail_alloc_page+0x5a/0x80 [ 153.026868][T28696] prepare_alloc_pages+0x15c/0x700 [ 153.031823][T28696] ? __alloc_pages_bulk+0xf50/0xf50 [ 153.036854][T28696] __alloc_pages+0x138/0x5e0 [ 153.041272][T28696] ? stack_trace_save+0x1c0/0x1c0 [ 153.046134][T28696] ? zone_watermark_fast+0x220/0x220 [ 153.051255][T28696] get_zeroed_page+0x19/0x40 [ 153.055681][T28696] __pud_alloc+0x8b/0x260 [ 153.059845][T28696] ? stack_trace_snprint+0xf0/0xf0 [ 153.064794][T28696] ? do_handle_mm_fault+0x2330/0x2330 [ 153.070000][T28696] ? __stack_depot_save+0x34/0x470 [ 153.074947][T28696] ? anon_vma_clone+0x9a/0x500 [ 153.079549][T28696] copy_page_range+0x2bcf/0x2f90 [ 153.084504][T28696] ? __kasan_slab_alloc+0xb1/0xe0 [ 153.089355][T28696] ? slab_post_alloc_hook+0x53/0x2c0 [ 153.094477][T28696] ? dup_mm+0x8c5/0x12c0 [ 153.098554][T28696] ? copy_mm+0x107/0x1b0 [ 153.102632][T28696] ? copy_process+0x12bc/0x3260 [ 153.107320][T28696] ? kernel_clone+0x21e/0x9e0 [ 153.111835][T28696] ? __x64_sys_clone3+0x376/0x3a0 [ 153.116704][T28696] ? do_syscall_64+0x3d/0xb0 [ 153.121120][T28696] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 153.127036][T28696] ? pfn_valid+0x1e0/0x1e0 [ 153.131277][T28696] ? rwsem_write_trylock+0x15b/0x290 [ 153.136397][T28696] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 153.142645][T28696] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 153.148203][T28696] ? __rb_insert_augmented+0x5de/0x610 [ 153.153501][T28696] dup_mm+0xadc/0x12c0 [ 153.157414][T28696] ? copy_init_mm+0x20/0x20 [ 153.161740][T28696] copy_mm+0x107/0x1b0 [ 153.165661][T28696] copy_process+0x12bc/0x3260 [ 153.170159][T28696] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 153.175103][T28696] ? copy_clone_args_from_user+0x744/0x830 [ 153.180746][T28696] kernel_clone+0x21e/0x9e0 [ 153.185085][T28696] ? __delayed_free_task+0x20/0x20 [ 153.190121][T28696] ? vfs_write+0x9ec/0x1110 [ 153.194460][T28696] ? create_io_thread+0x1e0/0x1e0 [ 153.199323][T28696] __x64_sys_clone3+0x376/0x3a0 [ 153.204006][T28696] ? __ia32_sys_clone+0x290/0x290 [ 153.208871][T28696] ? fput+0x1a/0x20 [ 153.212515][T28696] ? debug_smp_processor_id+0x17/0x20 [ 153.217721][T28696] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 153.223620][T28696] ? exit_to_user_mode_prepare+0x39/0xa0 [ 153.229090][T28696] do_syscall_64+0x3d/0xb0 [ 153.233340][T28696] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 153.239069][T28696] RIP: 0033:0x7f52511e2ae9 [ 153.243323][T28696] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 153.262871][T28696] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 153.271094][T28696] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 153.279028][T28696] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 153.286828][T28696] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 10:29:11 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 40) 10:29:11 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000100), 0x8, &(0x7f0000000040)) 10:29:11 executing program 1: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {0x2c}, &(0x7f00000000c0)=""/56, 0x38, &(0x7f0000000100)=""/178, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) 10:29:11 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/73, 0x49}, {0x0}], 0x2, 0x0) pipe(&(0x7f00000001c0)) 10:29:11 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x100080, 0x40000}, 0x20) 10:29:11 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x88c00, 0x10}, 0x18) getpgrp(0x0) (async) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 10:29:11 executing program 1: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {}, &(0x7f00000000c0)=""/56, 0x38, &(0x7f0000000100)=""/178, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) 10:29:11 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x88c00, 0x10}, 0x18) getpgrp(0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x88c00, 0x10}, 0x18) (async) getpgrp(0x0) (async) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) (async) 10:29:11 executing program 4: process_vm_readv(0x0, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)) [ 153.294766][T28696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 153.302572][T28696] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 153.310395][T28696] 10:29:11 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x100080, 0x40000}, 0x20) 10:29:11 executing program 1: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {}, &(0x7f00000000c0)=""/56, 0x38, &(0x7f0000000100)=""/178, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) 10:29:11 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001080)={'wpan3\x00', 0x0}) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1020c12}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x400, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x2000080}, 0x40c4) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)={0x14}, 0x14}}, 0x0) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a00), r5) sendmsg$IEEE802154_LLSEC_SETPARAMS(r6, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x20, r7, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}]}, 0x20}}, 0x0) sendmsg$IEEE802154_LLSEC_GETPARAMS(r4, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, r7, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000800}, 0x4040800) sendmsg$NLBL_UNLABEL_C_STATICLIST(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @loopback}]}, 0x64}, 0x1, 0x0, 0x0, 0x10}, 0x40000) [ 153.358631][T28735] FAULT_INJECTION: forcing a failure. [ 153.358631][T28735] name failslab, interval 1, probability 0, space 0, times 0 [ 153.392312][T28735] CPU: 0 PID: 28735 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 153.402482][T28735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 153.412378][T28735] Call Trace: [ 153.415495][T28735] [ 153.418277][T28735] dump_stack_lvl+0x151/0x1b7 [ 153.422792][T28735] ? io_uring_drop_tctx_refs+0x190/0x190 [ 153.428263][T28735] dump_stack+0x15/0x17 [ 153.432253][T28735] should_fail+0x3c6/0x510 [ 153.436514][T28735] __should_failslab+0xa4/0xe0 [ 153.441108][T28735] ? anon_vma_clone+0x9a/0x500 [ 153.445727][T28735] should_failslab+0x9/0x20 [ 153.450042][T28735] slab_pre_alloc_hook+0x37/0xd0 [ 153.454813][T28735] ? anon_vma_clone+0x9a/0x500 [ 153.459415][T28735] kmem_cache_alloc+0x44/0x200 [ 153.464019][T28735] anon_vma_clone+0x9a/0x500 [ 153.468440][T28735] anon_vma_fork+0x91/0x4e0 [ 153.472774][T28735] ? anon_vma_name+0x4c/0x70 [ 153.477201][T28735] ? vm_area_dup+0x17a/0x230 [ 153.481630][T28735] dup_mm+0x8c5/0x12c0 [ 153.485538][T28735] ? copy_init_mm+0x20/0x20 [ 153.489875][T28735] copy_mm+0x107/0x1b0 [ 153.493780][T28735] copy_process+0x12bc/0x3260 [ 153.498298][T28735] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 153.503240][T28735] ? copy_clone_args_from_user+0x744/0x830 [ 153.508883][T28735] kernel_clone+0x21e/0x9e0 [ 153.513220][T28735] ? __delayed_free_task+0x20/0x20 [ 153.518167][T28735] ? vfs_write+0x9ec/0x1110 [ 153.522507][T28735] ? create_io_thread+0x1e0/0x1e0 [ 153.527369][T28735] __x64_sys_clone3+0x376/0x3a0 [ 153.532055][T28735] ? __ia32_sys_clone+0x290/0x290 [ 153.536941][T28735] ? fput+0x1a/0x20 [ 153.540563][T28735] ? debug_smp_processor_id+0x17/0x20 [ 153.545768][T28735] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 153.551678][T28735] ? exit_to_user_mode_prepare+0x39/0xa0 [ 153.557226][T28735] do_syscall_64+0x3d/0xb0 [ 153.561490][T28735] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 153.567208][T28735] RIP: 0033:0x7f52511e2ae9 [ 153.571458][T28735] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 153.590898][T28735] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 153.599145][T28735] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 153.606955][T28735] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 153.614764][T28735] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 153.622577][T28735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 153.630390][T28735] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 153.638289][T28735] 10:29:12 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 41) 10:29:12 executing program 4: process_vm_readv(0x0, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)) 10:29:12 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x100080, 0x40000}, 0x20) 10:29:12 executing program 3: r0 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000001140)={0x558, r0, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_PEERS={0x154, 0x8, 0x0, 0x1, [{0x68, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @empty}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x7}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "1958ad081dbd933c8dd163e7e481c529540d0ba00d6ca10a0c4c616c53d478eb"}]}, {0x38, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "e54f864c6bc6127aa145dd09bffae02721458fbaef2dec8340ecd82bf844da73"}]}, {0x7c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x6, @local, 0x2}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x34, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @broadcast}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @broadcast}}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}]}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r1}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_PEERS={0x3b8, 0x8, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @private=0xa010102}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @remote}}]}, {0x78, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x3}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x800}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xffff}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "71b75b67a4e5a10c0cdbe519bce4ebd96aea11e19eebacf2e65b375628972770"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @remote}}]}, {0x4}, {0x140, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x13c, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x3}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}]}]}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}]}, {0x170, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x7}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x8}, @WGPEER_A_ALLOWEDIPS={0x15c, 0x9, 0x0, 0x1, [{0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x2}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xf}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}]}]}]}]}]}, 0x558}, 0x1, 0x0, 0x0, 0x4000}, 0x20000004) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) socketpair(0x5, 0x97989c0434efa7f6, 0x3, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() syz_open_procfs$userns(r4, 0x0) read$FUSE(r2, &(0x7f00000018c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r6 = getpid() syz_open_procfs$userns(r6, 0x0) r7 = getpid() syz_open_procfs$userns(r7, 0x0) syz_clone3(&(0x7f0000000900)={0x0, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x1d}, &(0x7f0000000740)=""/188, 0xbc, &(0x7f0000000800)=""/226, &(0x7f00000004c0)=[r4, r5, 0x0, 0x0, r6, r7, 0x0], 0x7, {r2}}, 0x58) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r3, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="060029040000800000"], 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vxcan0\x00'}) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000000140)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}, {&(0x7f0000000000)=""/128, 0x80}, {&(0x7f0000000080)=""/179, 0xb3}], 0x4, 0x0) 10:29:12 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001080)={'wpan3\x00', 0x0}) (async) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1020c12}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x400, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x2000080}, 0x40c4) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)={0x14}, 0x14}}, 0x0) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a00), r5) sendmsg$IEEE802154_LLSEC_SETPARAMS(r6, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x20, r7, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}]}, 0x20}}, 0x0) (async) sendmsg$IEEE802154_LLSEC_GETPARAMS(r4, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, r7, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000800}, 0x4040800) (async, rerun: 32) sendmsg$NLBL_UNLABEL_C_STATICLIST(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @loopback}]}, 0x64}, 0x1, 0x0, 0x0, 0x10}, 0x40000) (rerun: 32) 10:29:12 executing program 1: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {}, &(0x7f00000000c0)=""/56, 0x38, &(0x7f0000000100)=""/178, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) 10:29:12 executing program 1: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, &(0x7f0000000100)=""/178, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) 10:29:12 executing program 4: process_vm_readv(0x0, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)) [ 153.659518][T28745] FAULT_INJECTION: forcing a failure. [ 153.659518][T28745] name failslab, interval 1, probability 0, space 0, times 0 [ 153.677097][T28745] CPU: 1 PID: 28745 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 153.687252][T28745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 153.697147][T28745] Call Trace: [ 153.700272][T28745] [ 153.703048][T28745] dump_stack_lvl+0x151/0x1b7 10:29:12 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={0x10000a, 0x0, 0x40000}, 0x20) 10:29:12 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001080)={'wpan3\x00', 0x0}) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1020c12}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x400, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x2000080}, 0x40c4) (async) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)={0x14}, 0x14}}, 0x0) (async) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a00), r5) sendmsg$IEEE802154_LLSEC_SETPARAMS(r6, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x20, r7, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}]}, 0x20}}, 0x0) (async, rerun: 32) sendmsg$IEEE802154_LLSEC_GETPARAMS(r4, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, r7, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000800}, 0x4040800) (async, rerun: 32) sendmsg$NLBL_UNLABEL_C_STATICLIST(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @loopback}]}, 0x64}, 0x1, 0x0, 0x0, 0x10}, 0x40000) 10:29:12 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={0x10000a, 0x0, 0x40000}, 0x20) 10:29:12 executing program 4: process_vm_readv(0x0, &(0x7f0000000340), 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/73, 0x49}], 0x1, 0x0) pipe(&(0x7f00000001c0)) [ 153.707561][T28745] ? io_uring_drop_tctx_refs+0x190/0x190 [ 153.713033][T28745] dump_stack+0x15/0x17 [ 153.717020][T28745] should_fail+0x3c6/0x510 [ 153.723360][T28745] __should_failslab+0xa4/0xe0 [ 153.727959][T28745] ? anon_vma_clone+0x9a/0x500 [ 153.732556][T28745] should_failslab+0x9/0x20 [ 153.736894][T28745] slab_pre_alloc_hook+0x37/0xd0 [ 153.741666][T28745] ? anon_vma_clone+0x9a/0x500 [ 153.746262][T28745] kmem_cache_alloc+0x44/0x200 [ 153.750879][T28745] anon_vma_clone+0x9a/0x500 [ 153.755299][T28745] anon_vma_fork+0x91/0x4e0 [ 153.759639][T28745] ? anon_vma_name+0x4c/0x70 [ 153.764063][T28745] ? vm_area_dup+0x17a/0x230 [ 153.768485][T28745] dup_mm+0x8c5/0x12c0 [ 153.772404][T28745] ? copy_init_mm+0x20/0x20 [ 153.776734][T28745] copy_mm+0x107/0x1b0 [ 153.780636][T28745] copy_process+0x12bc/0x3260 [ 153.785154][T28745] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 153.790097][T28745] ? copy_clone_args_from_user+0x744/0x830 [ 153.795738][T28745] kernel_clone+0x21e/0x9e0 [ 153.800079][T28745] ? __delayed_free_task+0x20/0x20 [ 153.805032][T28745] ? vfs_write+0x9ec/0x1110 [ 153.809459][T28745] ? create_io_thread+0x1e0/0x1e0 [ 153.814314][T28745] ? raw_spin_rq_unlock+0x9/0x10 [ 153.819088][T28745] __x64_sys_clone3+0x376/0x3a0 [ 153.823775][T28745] ? __ia32_sys_clone+0x290/0x290 [ 153.828632][T28745] ? fput+0x1a/0x20 [ 153.832272][T28745] ? debug_smp_processor_id+0x17/0x20 [ 153.837479][T28745] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 153.843388][T28745] ? exit_to_user_mode_prepare+0x39/0xa0 [ 153.848851][T28745] do_syscall_64+0x3d/0xb0 [ 153.853101][T28745] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 153.858832][T28745] RIP: 0033:0x7f52511e2ae9 [ 153.863099][T28745] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 153.882526][T28745] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 153.890772][T28745] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 153.898581][T28745] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 10:29:12 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 42) 10:29:12 executing program 3: r0 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000001140)={0x558, r0, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_PEERS={0x154, 0x8, 0x0, 0x1, [{0x68, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @empty}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x7}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "1958ad081dbd933c8dd163e7e481c529540d0ba00d6ca10a0c4c616c53d478eb"}]}, {0x38, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "e54f864c6bc6127aa145dd09bffae02721458fbaef2dec8340ecd82bf844da73"}]}, {0x7c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x6, @local, 0x2}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x34, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @broadcast}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @broadcast}}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}]}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r1}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_PEERS={0x3b8, 0x8, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @private=0xa010102}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @remote}}]}, {0x78, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x3}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x800}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xffff}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "71b75b67a4e5a10c0cdbe519bce4ebd96aea11e19eebacf2e65b375628972770"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @remote}}]}, {0x4}, {0x140, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x13c, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x3}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}]}]}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}]}, {0x170, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x7}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x8}, @WGPEER_A_ALLOWEDIPS={0x15c, 0x9, 0x0, 0x1, [{0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x2}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xf}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}]}]}]}]}]}, 0x558}, 0x1, 0x0, 0x0, 0x4000}, 0x20000004) (async) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) socketpair(0x5, 0x97989c0434efa7f6, 0x3, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r4 = getpid() syz_open_procfs$userns(r4, 0x0) (async) read$FUSE(r2, &(0x7f00000018c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) r6 = getpid() syz_open_procfs$userns(r6, 0x0) (async) r7 = getpid() syz_open_procfs$userns(r7, 0x0) (async) syz_clone3(&(0x7f0000000900)={0x0, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x1d}, &(0x7f0000000740)=""/188, 0xbc, &(0x7f0000000800)=""/226, &(0x7f00000004c0)=[r4, r5, 0x0, 0x0, r6, r7, 0x0], 0x7, {r2}}, 0x58) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r3, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="060029040000800000"], 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4000) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vxcan0\x00'}) (async) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000000140)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}, {&(0x7f0000000000)=""/128, 0x80}, {&(0x7f0000000080)=""/179, 0xb3}], 0x4, 0x0) 10:29:12 executing program 1: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) 10:29:12 executing program 5: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x300, 0x72bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x8011) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:12 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={0x10000a, 0x0, 0x40000}, 0x20) 10:29:12 executing program 4: process_vm_readv(0x0, &(0x7f0000000340), 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/73, 0x49}], 0x1, 0x0) pipe(&(0x7f00000001c0)) 10:29:12 executing program 1: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 153.906394][T28745] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 153.914203][T28745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 153.922013][T28745] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 153.929829][T28745] [ 153.946197][T28774] FAULT_INJECTION: forcing a failure. [ 153.946197][T28774] name failslab, interval 1, probability 0, space 0, times 0 10:29:12 executing program 4: process_vm_readv(0x0, &(0x7f0000000340), 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/73, 0x49}], 0x1, 0x0) pipe(&(0x7f00000001c0)) 10:29:12 executing program 4: process_vm_readv(0x0, &(0x7f0000000340), 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) pipe(&(0x7f00000001c0)) 10:29:12 executing program 4: process_vm_readv(0x0, &(0x7f0000000340), 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) pipe(&(0x7f00000001c0)) 10:29:12 executing program 1: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 153.970522][T28774] CPU: 1 PID: 28774 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 153.980679][T28774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 153.990571][T28774] Call Trace: [ 153.993697][T28774] [ 153.996473][T28774] dump_stack_lvl+0x151/0x1b7 [ 154.000984][T28774] ? io_uring_drop_tctx_refs+0x190/0x190 [ 154.006452][T28774] dump_stack+0x15/0x17 [ 154.010447][T28774] should_fail+0x3c6/0x510 [ 154.014701][T28774] __should_failslab+0xa4/0xe0 10:29:12 executing program 1: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 154.019297][T28774] ? anon_vma_fork+0xf7/0x4e0 [ 154.023810][T28774] should_failslab+0x9/0x20 [ 154.028153][T28774] slab_pre_alloc_hook+0x37/0xd0 [ 154.032930][T28774] ? anon_vma_fork+0xf7/0x4e0 [ 154.037435][T28774] kmem_cache_alloc+0x44/0x200 [ 154.042034][T28774] anon_vma_fork+0xf7/0x4e0 [ 154.046377][T28774] ? anon_vma_name+0x4c/0x70 [ 154.050810][T28774] ? vm_area_dup+0x17a/0x230 [ 154.055234][T28774] dup_mm+0x8c5/0x12c0 [ 154.059140][T28774] ? copy_init_mm+0x20/0x20 [ 154.063479][T28774] copy_mm+0x107/0x1b0 [ 154.067385][T28774] copy_process+0x12bc/0x3260 [ 154.071897][T28774] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 154.076838][T28774] ? copy_clone_args_from_user+0x744/0x830 [ 154.082571][T28774] kernel_clone+0x21e/0x9e0 [ 154.086911][T28774] ? __delayed_free_task+0x20/0x20 [ 154.091852][T28774] ? vfs_write+0x9ec/0x1110 [ 154.096190][T28774] ? create_io_thread+0x1e0/0x1e0 [ 154.101052][T28774] __x64_sys_clone3+0x376/0x3a0 [ 154.105746][T28774] ? __ia32_sys_clone+0x290/0x290 [ 154.110598][T28774] ? fput+0x1a/0x20 [ 154.114242][T28774] ? debug_smp_processor_id+0x17/0x20 [ 154.119448][T28774] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 154.125354][T28774] ? exit_to_user_mode_prepare+0x39/0xa0 [ 154.130821][T28774] do_syscall_64+0x3d/0xb0 [ 154.135074][T28774] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 154.140800][T28774] RIP: 0033:0x7f52511e2ae9 [ 154.145057][T28774] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 10:29:12 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 43) 10:29:12 executing program 4: process_vm_readv(0x0, &(0x7f0000000340), 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) pipe(&(0x7f00000001c0)) 10:29:12 executing program 1: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) 10:29:12 executing program 5: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x300, 0x72bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x8011) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x300, 0x72bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x8011) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 10:29:12 executing program 3: r0 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000001140)={0x558, r0, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_PEERS={0x154, 0x8, 0x0, 0x1, [{0x68, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @empty}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x7}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "1958ad081dbd933c8dd163e7e481c529540d0ba00d6ca10a0c4c616c53d478eb"}]}, {0x38, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "e54f864c6bc6127aa145dd09bffae02721458fbaef2dec8340ecd82bf844da73"}]}, {0x7c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x6, @local, 0x2}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x34, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @broadcast}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @broadcast}}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}]}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r1}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_PEERS={0x3b8, 0x8, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @private=0xa010102}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @remote}}]}, {0x78, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x3}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x800}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xffff}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "71b75b67a4e5a10c0cdbe519bce4ebd96aea11e19eebacf2e65b375628972770"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @remote}}]}, {0x4}, {0x140, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x13c, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x3}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}]}]}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}]}, {0x170, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x7}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x8}, @WGPEER_A_ALLOWEDIPS={0x15c, 0x9, 0x0, 0x1, [{0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x2}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xf}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}]}]}]}]}]}, 0x558}, 0x1, 0x0, 0x0, 0x4000}, 0x20000004) (async) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) (async) socketpair(0x5, 0x97989c0434efa7f6, 0x3, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r4 = getpid() syz_open_procfs$userns(r4, 0x0) (async) read$FUSE(r2, &(0x7f00000018c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) r6 = getpid() syz_open_procfs$userns(r6, 0x0) (async) r7 = getpid() syz_open_procfs$userns(r7, 0x0) syz_clone3(&(0x7f0000000900)={0x0, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x1d}, &(0x7f0000000740)=""/188, 0xbc, &(0x7f0000000800)=""/226, &(0x7f00000004c0)=[r4, r5, 0x0, 0x0, r6, r7, 0x0], 0x7, {r2}}, 0x58) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r3, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="060029040000800000"], 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vxcan0\x00'}) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000000140)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}, {&(0x7f0000000000)=""/128, 0x80}, {&(0x7f0000000080)=""/179, 0xb3}], 0x4, 0x0) 10:29:12 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={0x10000a, 0x100080}, 0x20) 10:29:12 executing program 4: process_vm_readv(0x0, &(0x7f0000000340), 0x0, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) pipe(&(0x7f00000001c0)) [ 154.164494][T28774] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 154.172745][T28774] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 154.180549][T28774] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 154.188462][T28774] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 154.196270][T28774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 154.204083][T28774] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 154.211895][T28774] 10:29:12 executing program 5: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x300, 0x72bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x8011) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:12 executing program 0: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:12 executing program 3: r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x4f2b}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x884) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:12 executing program 1: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff], 0x1}, 0x58) 10:29:12 executing program 4: process_vm_readv(0x0, &(0x7f0000000340), 0x0, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) pipe(&(0x7f00000001c0)) [ 154.255466][T28818] FAULT_INJECTION: forcing a failure. [ 154.255466][T28818] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 154.282168][T28818] CPU: 1 PID: 28818 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 154.292555][T28818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 154.302445][T28818] Call Trace: [ 154.305573][T28818] [ 154.308350][T28818] dump_stack_lvl+0x151/0x1b7 [ 154.312858][T28818] ? io_uring_drop_tctx_refs+0x190/0x190 [ 154.318329][T28818] dump_stack+0x15/0x17 [ 154.322318][T28818] should_fail+0x3c6/0x510 [ 154.326574][T28818] should_fail_alloc_page+0x5a/0x80 [ 154.331602][T28818] prepare_alloc_pages+0x15c/0x700 [ 154.336548][T28818] ? __alloc_pages_bulk+0xf50/0xf50 [ 154.341581][T28818] __alloc_pages+0x138/0x5e0 [ 154.346008][T28818] ? zone_watermark_fast+0x220/0x220 [ 154.351131][T28818] ? is_bpf_text_address+0x172/0x190 [ 154.356257][T28818] pte_alloc_one+0x73/0x1b0 [ 154.360588][T28818] ? pfn_modify_allowed+0x2f0/0x2f0 [ 154.365624][T28818] ? arch_stack_walk+0xf3/0x140 [ 154.370401][T28818] __pte_alloc+0x86/0x350 [ 154.374562][T28818] ? free_pgtables+0x280/0x280 [ 154.379252][T28818] ? _raw_spin_lock+0xa4/0x1b0 [ 154.383987][T28818] ? __kasan_check_write+0x14/0x20 [ 154.389109][T28818] copy_page_range+0x28a8/0x2f90 [ 154.393892][T28818] ? __kasan_slab_alloc+0xb1/0xe0 [ 154.398740][T28818] ? pfn_valid+0x1e0/0x1e0 [ 154.403028][T28818] ? vma_gap_callbacks_rotate+0x1b7/0x210 [ 154.408545][T28818] ? __rb_insert_augmented+0x5de/0x610 [ 154.413843][T28818] dup_mm+0xadc/0x12c0 [ 154.417753][T28818] ? copy_init_mm+0x20/0x20 [ 154.422089][T28818] copy_mm+0x107/0x1b0 [ 154.425990][T28818] copy_process+0x12bc/0x3260 [ 154.430504][T28818] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 154.435449][T28818] ? copy_clone_args_from_user+0x744/0x830 [ 154.441093][T28818] kernel_clone+0x21e/0x9e0 [ 154.445441][T28818] ? __delayed_free_task+0x20/0x20 [ 154.450378][T28818] ? vfs_write+0x9ec/0x1110 [ 154.454722][T28818] ? create_io_thread+0x1e0/0x1e0 [ 154.459587][T28818] __x64_sys_clone3+0x376/0x3a0 [ 154.464266][T28818] ? __ia32_sys_clone+0x290/0x290 [ 154.469126][T28818] ? fput+0x1a/0x20 [ 154.472783][T28818] ? debug_smp_processor_id+0x17/0x20 [ 154.477978][T28818] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 154.483888][T28818] ? exit_to_user_mode_prepare+0x39/0xa0 [ 154.489785][T28818] do_syscall_64+0x3d/0xb0 [ 154.494035][T28818] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 154.499768][T28818] RIP: 0033:0x7f52511e2ae9 [ 154.504017][T28818] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 154.523545][T28818] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 154.531787][T28818] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 154.539599][T28818] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 154.547430][T28818] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 10:29:13 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 44) 10:29:13 executing program 0: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:13 executing program 4: process_vm_readv(0x0, &(0x7f0000000340), 0x0, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) pipe(&(0x7f00000001c0)) 10:29:13 executing program 3: r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x4f2b}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x884) (async, rerun: 32) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (rerun: 32) 10:29:13 executing program 5: getpgrp(0x0) r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) r2 = getpid() syz_open_procfs$userns(r2, 0x0) process_vm_readv(r2, 0x0, 0xf20bca160ba63284, 0x0, 0xffffffffffffff07, 0x0) 10:29:13 executing program 1: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x58) 10:29:13 executing program 5: getpgrp(0x0) (async) r0 = getpid() syz_open_procfs$userns(r0, 0x0) (async) r1 = getpid() syz_open_procfs$userns(r1, 0x0) (async) r2 = getpid() syz_open_procfs$userns(r2, 0x0) (async) process_vm_readv(r2, 0x0, 0xf20bca160ba63284, 0x0, 0xffffffffffffff07, 0x0) 10:29:13 executing program 1: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x58) 10:29:13 executing program 0: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:13 executing program 3: r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x4f2b}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x884) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) open(0x0, 0x680002, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x4f2b}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x884) (async) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) [ 154.555221][T28818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 154.563041][T28818] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 154.570846][T28818] 10:29:13 executing program 0: syz_clone3(0x0, 0x0) 10:29:13 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) [ 154.629813][T28847] FAULT_INJECTION: forcing a failure. [ 154.629813][T28847] name failslab, interval 1, probability 0, space 0, times 0 [ 154.656722][T28847] CPU: 1 PID: 28847 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 154.666893][T28847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 154.677131][T28847] Call Trace: [ 154.680335][T28847] [ 154.683115][T28847] dump_stack_lvl+0x151/0x1b7 [ 154.687626][T28847] ? io_uring_drop_tctx_refs+0x190/0x190 [ 154.693092][T28847] dump_stack+0x15/0x17 [ 154.697096][T28847] should_fail+0x3c6/0x510 [ 154.701461][T28847] __should_failslab+0xa4/0xe0 [ 154.706111][T28847] ? vm_area_dup+0x26/0x230 [ 154.710454][T28847] should_failslab+0x9/0x20 [ 154.714793][T28847] slab_pre_alloc_hook+0x37/0xd0 [ 154.719566][T28847] ? vm_area_dup+0x26/0x230 [ 154.723905][T28847] kmem_cache_alloc+0x44/0x200 [ 154.728591][T28847] vm_area_dup+0x26/0x230 [ 154.732759][T28847] dup_mm+0x81b/0x12c0 [ 154.736686][T28847] ? copy_init_mm+0x20/0x20 [ 154.741001][T28847] copy_mm+0x107/0x1b0 [ 154.744908][T28847] copy_process+0x12bc/0x3260 [ 154.749427][T28847] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 154.754369][T28847] ? copy_clone_args_from_user+0x744/0x830 [ 154.760009][T28847] kernel_clone+0x21e/0x9e0 [ 154.764349][T28847] ? __delayed_free_task+0x20/0x20 [ 154.769303][T28847] ? vfs_write+0x9ec/0x1110 [ 154.773637][T28847] ? create_io_thread+0x1e0/0x1e0 [ 154.778501][T28847] __x64_sys_clone3+0x376/0x3a0 [ 154.783193][T28847] ? __ia32_sys_clone+0x290/0x290 [ 154.788055][T28847] ? fput+0x1a/0x20 [ 154.791690][T28847] ? debug_smp_processor_id+0x17/0x20 [ 154.796895][T28847] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 154.802801][T28847] ? exit_to_user_mode_prepare+0x39/0xa0 [ 154.808267][T28847] do_syscall_64+0x3d/0xb0 [ 154.812519][T28847] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 154.818249][T28847] RIP: 0033:0x7f52511e2ae9 [ 154.822502][T28847] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 154.843875][T28847] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 154.852197][T28847] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 154.860095][T28847] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 154.867915][T28847] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 10:29:13 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 45) 10:29:13 executing program 4: process_vm_readv(0x0, &(0x7f0000000340), 0x8, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/73, 0x4d}, {0x0}], 0x2, 0x0) pipe(0x0) 10:29:13 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) 10:29:13 executing program 0: syz_clone3(0x0, 0x0) 10:29:13 executing program 1: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x58) 10:29:13 executing program 5: getpgrp(0x0) (async, rerun: 64) r0 = getpid() (rerun: 64) syz_open_procfs$userns(r0, 0x0) (async, rerun: 64) r1 = getpid() (rerun: 64) syz_open_procfs$userns(r1, 0x0) r2 = getpid() syz_open_procfs$userns(r2, 0x0) (async) process_vm_readv(r2, 0x0, 0xf20bca160ba63284, 0x0, 0xffffffffffffff07, 0x0) 10:29:13 executing program 4: process_vm_readv(0x0, &(0x7f0000000340), 0x8, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/73, 0x4d}, {0x0}], 0x2, 0x0) pipe(0x0) 10:29:13 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) 10:29:13 executing program 0: syz_clone3(0x0, 0x0) [ 154.875720][T28847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 154.883527][T28847] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 154.891429][T28847] [ 154.915009][T28865] FAULT_INJECTION: forcing a failure. [ 154.915009][T28865] name fail_page_alloc, interval 1, probability 0, space 0, times 0 10:29:13 executing program 3: r0 = getpid() syz_open_procfs$userns(r0, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:13 executing program 3: r0 = getpid() syz_open_procfs$userns(r0, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/net\x00') (async) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:13 executing program 3: r0 = getpid() syz_open_procfs$userns(r0, 0x0) (async) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/net\x00') (async) process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) [ 154.939382][T28865] CPU: 1 PID: 28865 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 154.949543][T28865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 154.959439][T28865] Call Trace: [ 154.962563][T28865] [ 154.965338][T28865] dump_stack_lvl+0x151/0x1b7 [ 154.969942][T28865] ? io_uring_drop_tctx_refs+0x190/0x190 [ 154.975408][T28865] dump_stack+0x15/0x17 [ 154.979405][T28865] should_fail+0x3c6/0x510 [ 154.983654][T28865] should_fail_alloc_page+0x5a/0x80 [ 154.988681][T28865] prepare_alloc_pages+0x15c/0x700 [ 154.993647][T28865] ? __alloc_pages_bulk+0xf50/0xf50 [ 154.998663][T28865] __alloc_pages+0x138/0x5e0 [ 155.003087][T28865] ? stack_trace_save+0x1c0/0x1c0 [ 155.007948][T28865] ? zone_watermark_fast+0x220/0x220 [ 155.013072][T28865] get_zeroed_page+0x19/0x40 [ 155.017505][T28865] __pud_alloc+0x8b/0x260 [ 155.021660][T28865] ? stack_trace_snprint+0xf0/0xf0 [ 155.026613][T28865] ? do_handle_mm_fault+0x2330/0x2330 [ 155.031825][T28865] ? __stack_depot_save+0x34/0x470 [ 155.036761][T28865] ? anon_vma_clone+0x9a/0x500 [ 155.041362][T28865] copy_page_range+0x2bcf/0x2f90 [ 155.046134][T28865] ? __kasan_slab_alloc+0xb1/0xe0 [ 155.050995][T28865] ? slab_post_alloc_hook+0x53/0x2c0 [ 155.056114][T28865] ? dup_mm+0x8c5/0x12c0 [ 155.060194][T28865] ? copy_mm+0x107/0x1b0 [ 155.064360][T28865] ? copy_process+0x12bc/0x3260 [ 155.069048][T28865] ? kernel_clone+0x21e/0x9e0 [ 155.073648][T28865] ? __x64_sys_clone3+0x376/0x3a0 [ 155.078509][T28865] ? do_syscall_64+0x3d/0xb0 [ 155.082937][T28865] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 155.088839][T28865] ? pfn_valid+0x1e0/0x1e0 [ 155.093088][T28865] ? rwsem_write_trylock+0x15b/0x290 [ 155.098212][T28865] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 155.104458][T28865] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 155.110015][T28865] ? __rb_insert_augmented+0x5de/0x610 [ 155.115316][T28865] dup_mm+0xadc/0x12c0 [ 155.119215][T28865] ? copy_init_mm+0x20/0x20 [ 155.123553][T28865] copy_mm+0x107/0x1b0 [ 155.127460][T28865] copy_process+0x12bc/0x3260 [ 155.131975][T28865] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 155.136927][T28865] ? copy_clone_args_from_user+0x744/0x830 [ 155.142562][T28865] kernel_clone+0x21e/0x9e0 [ 155.146900][T28865] ? __delayed_free_task+0x20/0x20 [ 155.151846][T28865] ? vfs_write+0x9ec/0x1110 [ 155.156193][T28865] ? create_io_thread+0x1e0/0x1e0 [ 155.161049][T28865] __x64_sys_clone3+0x376/0x3a0 [ 155.165736][T28865] ? __ia32_sys_clone+0x290/0x290 [ 155.171463][T28865] ? fput+0x1a/0x20 [ 155.175118][T28865] ? debug_smp_processor_id+0x17/0x20 [ 155.180315][T28865] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 155.186223][T28865] ? exit_to_user_mode_prepare+0x39/0xa0 [ 155.191686][T28865] do_syscall_64+0x3d/0xb0 [ 155.195937][T28865] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 155.201669][T28865] RIP: 0033:0x7f52511e2ae9 [ 155.205919][T28865] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 155.226143][T28865] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 10:29:13 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 46) 10:29:13 executing program 3: process_vm_readv(0x0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/88, 0x58}], 0x1, &(0x7f0000001640)=[{&(0x7f0000000100)=""/159, 0x9f}, {&(0x7f00000001c0)=""/113, 0x71}, {&(0x7f0000000240)=""/165, 0xa5}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/14, 0xe}, {&(0x7f0000001700)=""/225, 0xe1}, {&(0x7f0000001440)=""/62, 0x3e}, {&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/140, 0x8c}], 0x9, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 10:29:13 executing program 0: syz_clone3(&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:13 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)=""/4096, 0x1000}, {&(0x7f0000001000)=""/142, 0x8e}], 0x2, &(0x7f0000002480)=[{&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000002100)=""/82, 0x52}, {&(0x7f0000002180)=""/71, 0x47}, {&(0x7f0000002200)=""/183, 0xb7}, {&(0x7f00000022c0)=""/218, 0xda}, {&(0x7f00000023c0)=""/187, 0xbb}], 0x6, 0x0) 10:29:13 executing program 4: process_vm_readv(0x0, &(0x7f0000000340), 0x8, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/73, 0x4d}, {0x0}], 0x2, 0x0) pipe(0x0) 10:29:13 executing program 1: r0 = getpid() syz_open_procfs$userns(r0, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:13 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)=""/4096, 0x1000}, {&(0x7f0000001000)=""/142, 0x8e}], 0x2, &(0x7f0000002480)=[{&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000002100)=""/82, 0x52}, {&(0x7f0000002180)=""/71, 0x47}, {&(0x7f0000002200)=""/183, 0xb7}, {&(0x7f00000022c0)=""/218, 0xda}, {&(0x7f00000023c0)=""/187, 0xbb}], 0x6, 0x0) 10:29:13 executing program 1: r0 = getpid() syz_open_procfs$userns(r0, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:13 executing program 3: process_vm_readv(0x0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/88, 0x58}], 0x1, &(0x7f0000001640)=[{&(0x7f0000000100)=""/159, 0x9f}, {&(0x7f00000001c0)=""/113, 0x71}, {&(0x7f0000000240)=""/165, 0xa5}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/14, 0xe}, {&(0x7f0000001700)=""/225, 0xe1}, {&(0x7f0000001440)=""/62, 0x3e}, {&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/140, 0x8c}], 0x9, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) process_vm_readv(0x0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/88, 0x58}], 0x1, &(0x7f0000001640)=[{&(0x7f0000000100)=""/159, 0x9f}, {&(0x7f00000001c0)=""/113, 0x71}, {&(0x7f0000000240)=""/165, 0xa5}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/14, 0xe}, {&(0x7f0000001700)=""/225, 0xe1}, {&(0x7f0000001440)=""/62, 0x3e}, {&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/140, 0x8c}], 0x9, 0x0) (async) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) (async) [ 155.234386][T28865] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 155.242370][T28865] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 155.250268][T28865] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 155.258079][T28865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 155.265894][T28865] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 155.273707][T28865] 10:29:13 executing program 4: process_vm_readv(0x0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/88, 0x58}], 0x1, &(0x7f0000001640)=[{&(0x7f0000000100)=""/159, 0x9f}, {&(0x7f00000001c0)=""/113, 0x71}, {&(0x7f0000000240)=""/165, 0xa5}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/14, 0xe}, {&(0x7f0000001700)=""/225, 0xe1}, {&(0x7f0000001440)=""/62, 0x3e}, {&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/140, 0x8c}], 0x9, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 10:29:13 executing program 0: syz_clone3(&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:13 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) process_vm_readv(0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)=""/4096, 0x1000}, {&(0x7f0000001000)=""/142, 0x8e}], 0x2, &(0x7f0000002480)=[{&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000002100)=""/82, 0x52}, {&(0x7f0000002180)=""/71, 0x47}, {&(0x7f0000002200)=""/183, 0xb7}, {&(0x7f00000022c0)=""/218, 0xda}, {&(0x7f00000023c0)=""/187, 0xbb}], 0x6, 0x0) [ 155.325700][T28906] FAULT_INJECTION: forcing a failure. [ 155.325700][T28906] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 155.350298][T28906] CPU: 0 PID: 28906 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 155.360457][T28906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 155.370355][T28906] Call Trace: [ 155.373477][T28906] [ 155.376259][T28906] dump_stack_lvl+0x151/0x1b7 [ 155.380763][T28906] ? io_uring_drop_tctx_refs+0x190/0x190 [ 155.386238][T28906] dump_stack+0x15/0x17 [ 155.390308][T28906] should_fail+0x3c6/0x510 [ 155.394561][T28906] should_fail_alloc_page+0x5a/0x80 [ 155.399606][T28906] prepare_alloc_pages+0x15c/0x700 [ 155.404544][T28906] ? __alloc_pages_bulk+0xf50/0xf50 [ 155.409574][T28906] __alloc_pages+0x138/0x5e0 [ 155.414001][T28906] ? stack_trace_save+0x1c0/0x1c0 [ 155.418860][T28906] ? zone_watermark_fast+0x220/0x220 [ 155.423983][T28906] get_zeroed_page+0x19/0x40 [ 155.428407][T28906] __pud_alloc+0x8b/0x260 [ 155.432574][T28906] ? stack_trace_snprint+0xf0/0xf0 [ 155.437521][T28906] ? do_handle_mm_fault+0x2330/0x2330 [ 155.442727][T28906] ? __stack_depot_save+0x34/0x470 [ 155.447677][T28906] ? anon_vma_clone+0x9a/0x500 [ 155.452276][T28906] copy_page_range+0x2bcf/0x2f90 [ 155.457048][T28906] ? __kasan_slab_alloc+0xb1/0xe0 [ 155.461934][T28906] ? slab_post_alloc_hook+0x53/0x2c0 [ 155.467030][T28906] ? dup_mm+0x8c5/0x12c0 [ 155.471196][T28906] ? copy_mm+0x107/0x1b0 [ 155.475278][T28906] ? copy_process+0x12bc/0x3260 [ 155.479962][T28906] ? kernel_clone+0x21e/0x9e0 [ 155.484479][T28906] ? __x64_sys_clone3+0x376/0x3a0 [ 155.489334][T28906] ? do_syscall_64+0x3d/0xb0 [ 155.493760][T28906] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 155.499672][T28906] ? pfn_valid+0x1e0/0x1e0 [ 155.503916][T28906] ? rwsem_write_trylock+0x15b/0x290 [ 155.509037][T28906] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 155.515286][T28906] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 155.520840][T28906] ? __rb_insert_augmented+0x5de/0x610 [ 155.526142][T28906] dup_mm+0xadc/0x12c0 [ 155.530040][T28906] ? copy_init_mm+0x20/0x20 [ 155.534379][T28906] copy_mm+0x107/0x1b0 [ 155.538287][T28906] copy_process+0x12bc/0x3260 [ 155.542801][T28906] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 155.547747][T28906] ? copy_clone_args_from_user+0x744/0x830 [ 155.553386][T28906] kernel_clone+0x21e/0x9e0 [ 155.557727][T28906] ? __delayed_free_task+0x20/0x20 [ 155.562672][T28906] ? vfs_write+0x9ec/0x1110 [ 155.567015][T28906] ? create_io_thread+0x1e0/0x1e0 [ 155.571873][T28906] __x64_sys_clone3+0x376/0x3a0 [ 155.576563][T28906] ? __ia32_sys_clone+0x290/0x290 [ 155.581421][T28906] ? fput+0x1a/0x20 [ 155.585067][T28906] ? debug_smp_processor_id+0x17/0x20 [ 155.590288][T28906] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 155.596184][T28906] ? exit_to_user_mode_prepare+0x39/0xa0 [ 155.601644][T28906] do_syscall_64+0x3d/0xb0 [ 155.605901][T28906] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 155.611670][T28906] RIP: 0033:0x7f52511e2ae9 [ 155.615876][T28906] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 155.635410][T28906] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 155.643739][T28906] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 155.651641][T28906] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 155.659444][T28906] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 155.667258][T28906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:29:14 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 47) 10:29:14 executing program 1: r0 = getpid() syz_open_procfs$userns(r0, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:14 executing program 5: r0 = getpid() pidfd_open(r0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) wait4(r1, &(0x7f0000002040), 0x4, &(0x7f0000002080)) process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:14 executing program 0: syz_clone3(&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:14 executing program 4: process_vm_readv(0x0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/88, 0x58}], 0x1, &(0x7f0000001640)=[{&(0x7f0000000100)=""/159, 0x9f}, {&(0x7f00000001c0)=""/113, 0x71}, {&(0x7f0000000240)=""/165, 0xa5}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/14, 0xe}, {&(0x7f0000001700)=""/225, 0xe1}, {&(0x7f0000001440)=""/62, 0x3e}, {&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/140, 0x8c}], 0x9, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 10:29:14 executing program 3: process_vm_readv(0x0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/88, 0x58}], 0x1, &(0x7f0000001640)=[{&(0x7f0000000100)=""/159, 0x9f}, {&(0x7f00000001c0)=""/113, 0x71}, {&(0x7f0000000240)=""/165, 0xa5}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/14, 0xe}, {&(0x7f0000001700)=""/225, 0xe1}, {&(0x7f0000001440)=""/62, 0x3e}, {&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/140, 0x8c}], 0x9, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 10:29:14 executing program 1: r0 = getpid() syz_open_procfs$userns(r0, 0x0) process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) [ 155.675069][T28906] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 155.682883][T28906] [ 155.708916][T28929] FAULT_INJECTION: forcing a failure. [ 155.708916][T28929] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 155.726566][T28929] CPU: 0 PID: 28929 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 155.736819][T28929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 155.746802][T28929] Call Trace: [ 155.749921][T28929] [ 155.752702][T28929] dump_stack_lvl+0x151/0x1b7 [ 155.757212][T28929] ? io_uring_drop_tctx_refs+0x190/0x190 [ 155.762684][T28929] dump_stack+0x15/0x17 [ 155.766675][T28929] should_fail+0x3c6/0x510 [ 155.771018][T28929] should_fail_alloc_page+0x5a/0x80 [ 155.776046][T28929] prepare_alloc_pages+0x15c/0x700 [ 155.781088][T28929] ? __alloc_pages_bulk+0xf50/0xf50 [ 155.786203][T28929] ? __alloc_pages+0x5e0/0x5e0 [ 155.790812][T28929] __alloc_pages+0x138/0x5e0 [ 155.795229][T28929] ? zone_watermark_fast+0x220/0x220 [ 155.800350][T28929] ? __alloc_pages+0x206/0x5e0 [ 155.804949][T28929] ? __kasan_check_write+0x14/0x20 [ 155.809895][T28929] ? _raw_spin_lock+0xa4/0x1b0 [ 155.814496][T28929] pte_alloc_one+0x73/0x1b0 [ 155.819191][T28929] ? pfn_modify_allowed+0x2f0/0x2f0 10:29:14 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f00000000c0)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000000040)=""/85, 0xfffffffffffffc21}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000001c0)={&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000180)}) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0xa40, 0x20) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000740)={0x0, 0x187, 0xb4}) 10:29:14 executing program 1: r0 = getpid() syz_open_procfs$userns(r0, 0x0) process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:14 executing program 0: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:14 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f00000000c0)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000000040)=""/85, 0xfffffffffffffc21}, {0x0}], 0x2, 0x0) (async) r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000001c0)={&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000180)}) (async) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0xa40, 0x20) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000740)={0x0, 0x187, 0xb4}) 10:29:14 executing program 1: r0 = getpid() syz_open_procfs$userns(r0, 0x0) process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) [ 155.824213][T28929] ? __pmd_alloc+0x48d/0x550 [ 155.828642][T28929] __pte_alloc+0x86/0x350 [ 155.832814][T28929] ? __pud_alloc+0x260/0x260 [ 155.837231][T28929] ? __pud_alloc+0x213/0x260 [ 155.841661][T28929] ? free_pgtables+0x280/0x280 [ 155.846268][T28929] ? do_handle_mm_fault+0x2330/0x2330 [ 155.851470][T28929] ? __stack_depot_save+0x34/0x470 [ 155.856415][T28929] ? anon_vma_clone+0x9a/0x500 [ 155.861013][T28929] copy_page_range+0x28a8/0x2f90 [ 155.865783][T28929] ? __kasan_slab_alloc+0xb1/0xe0 [ 155.870646][T28929] ? slab_post_alloc_hook+0x53/0x2c0 [ 155.875763][T28929] ? copy_process+0x12bc/0x3260 [ 155.880449][T28929] ? __x64_sys_clone3+0x376/0x3a0 [ 155.885310][T28929] ? do_syscall_64+0x3d/0xb0 [ 155.889736][T28929] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 155.895651][T28929] ? pfn_valid+0x1e0/0x1e0 [ 155.899890][T28929] ? rwsem_write_trylock+0x15b/0x290 [ 155.905013][T28929] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 155.911281][T28929] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 155.916826][T28929] ? __rb_insert_augmented+0x5de/0x610 [ 155.922111][T28929] dup_mm+0xadc/0x12c0 [ 155.926018][T28929] ? copy_init_mm+0x20/0x20 [ 155.930358][T28929] copy_mm+0x107/0x1b0 [ 155.934260][T28929] copy_process+0x12bc/0x3260 [ 155.938777][T28929] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 155.943723][T28929] ? copy_clone_args_from_user+0x744/0x830 [ 155.949363][T28929] kernel_clone+0x21e/0x9e0 [ 155.953703][T28929] ? __delayed_free_task+0x20/0x20 [ 155.958735][T28929] ? vfs_write+0x9ec/0x1110 [ 155.963074][T28929] ? create_io_thread+0x1e0/0x1e0 [ 155.967935][T28929] __x64_sys_clone3+0x376/0x3a0 [ 155.972620][T28929] ? __ia32_sys_clone+0x290/0x290 [ 155.977484][T28929] ? fput+0x1a/0x20 [ 155.981129][T28929] ? debug_smp_processor_id+0x17/0x20 [ 155.986336][T28929] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 155.992248][T28929] ? exit_to_user_mode_prepare+0x39/0xa0 [ 155.997711][T28929] do_syscall_64+0x3d/0xb0 [ 156.001962][T28929] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 156.007686][T28929] RIP: 0033:0x7f52511e2ae9 [ 156.011942][T28929] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 156.031469][T28929] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 156.039713][T28929] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 156.047529][T28929] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 156.055349][T28929] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 156.063150][T28929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 156.070959][T28929] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 10:29:14 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 48) 10:29:14 executing program 0: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:14 executing program 1: r0 = getpid() syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:14 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f00000000c0)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000000040)=""/85, 0xfffffffffffffc21}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000001c0)={&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000180)}) (async) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0xa40, 0x20) (async) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000740)={0x0, 0x187, 0xb4}) 10:29:14 executing program 5: r0 = getpid() pidfd_open(r0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) wait4(r1, &(0x7f0000002040), 0x4, &(0x7f0000002080)) process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:14 executing program 4: process_vm_readv(0x0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/88, 0x58}], 0x1, &(0x7f0000001640)=[{&(0x7f0000000100)=""/159, 0x9f}, {&(0x7f00000001c0)=""/113, 0x71}, {&(0x7f0000000240)=""/165, 0xa5}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/14, 0xe}, {&(0x7f0000001700)=""/225, 0xe1}, {&(0x7f0000001440)=""/62, 0x3e}, {&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/140, 0x8c}], 0x9, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 10:29:14 executing program 5: r0 = getpid() pidfd_open(r0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) wait4(r1, &(0x7f0000002040), 0x4, &(0x7f0000002080)) (async) process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:14 executing program 4: syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 10:29:14 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:14 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() pipe(&(0x7f0000004100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(0xffffffffffffffff, &(0x7f0000004180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000041c0)=0x14) sendmsg$ETHTOOL_MSG_EEE_GET(r2, &(0x7f0000004280)={&(0x7f0000004140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000004240)={&(0x7f0000004340)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010027bd7000ffdbdf25170000000c00018008000100355c0000bbc7983ac0cf567fd905000000a3a95bd478f866e12ac4678d5991c749d27dac6e46b0909036f1a1706cdebe", @ANYRES32=r3, @ANYBLOB="d42889baa3914b6dcab759a9fe249c5eaea114ddbfb087ebaa1a1cf0a30f2a802f0018f3016afe5c8c23451a86229b53725dc1e2854656aad8daf2a1b23bd1bee332fc9387a31a70242af9a5afd7aea5b3ae4be3ba6f5b402c0fcc2e7f9e4cfc896a4ce30ed0bb5fe217aa22d61b7ef4ea00882fea006b15a636b9d72d37c9536f1e2aabaf877b93eb1dc5b176c9867972678fbbeae5781a1d6def1de14f6b7ce77eb7ae2ad0dabcf18d59b9dea9bd387c2f5b19"], 0x20}, 0x1, 0x0, 0x0, 0x400c000}, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000002080), 0x40001, 0x0) read$FUSE(r4, &(0x7f00000020c0)={0x2020}, 0x2020) syz_open_procfs$userns(r1, 0x0) r5 = getpid() syz_open_procfs$userns(r5, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$userns(r6, &(0x7f0000002040)) process_vm_readv(r5, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:14 executing program 0: syz_clone3(&(0x7f0000000200)={0x45090000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:14 executing program 4: syz_extract_tcp_res$synack(0x0, 0x1, 0x0) [ 156.078771][T28929] [ 156.097566][T28951] FAULT_INJECTION: forcing a failure. [ 156.097566][T28951] name failslab, interval 1, probability 0, space 0, times 0 [ 156.153891][T28951] CPU: 0 PID: 28951 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 156.164058][T28951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 156.173952][T28951] Call Trace: [ 156.177075][T28951] [ 156.179848][T28951] dump_stack_lvl+0x151/0x1b7 [ 156.184358][T28951] ? io_uring_drop_tctx_refs+0x190/0x190 [ 156.189829][T28951] dump_stack+0x15/0x17 [ 156.193817][T28951] should_fail+0x3c6/0x510 [ 156.198072][T28951] __should_failslab+0xa4/0xe0 [ 156.202670][T28951] ? vm_area_dup+0x26/0x230 [ 156.207012][T28951] should_failslab+0x9/0x20 [ 156.211351][T28951] slab_pre_alloc_hook+0x37/0xd0 [ 156.216123][T28951] ? vm_area_dup+0x26/0x230 [ 156.220464][T28951] kmem_cache_alloc+0x44/0x200 [ 156.225064][T28951] vm_area_dup+0x26/0x230 [ 156.229229][T28951] dup_mm+0x81b/0x12c0 [ 156.233136][T28951] ? copy_init_mm+0x20/0x20 [ 156.237479][T28951] copy_mm+0x107/0x1b0 [ 156.241381][T28951] copy_process+0x12bc/0x3260 [ 156.245896][T28951] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 156.250843][T28951] ? copy_clone_args_from_user+0x744/0x830 [ 156.256481][T28951] kernel_clone+0x21e/0x9e0 [ 156.260821][T28951] ? __delayed_free_task+0x20/0x20 [ 156.265766][T28951] ? vfs_write+0x9ec/0x1110 [ 156.270110][T28951] ? create_io_thread+0x1e0/0x1e0 [ 156.274968][T28951] __x64_sys_clone3+0x376/0x3a0 [ 156.279655][T28951] ? __ia32_sys_clone+0x290/0x290 [ 156.284514][T28951] ? fput+0x1a/0x20 [ 156.288162][T28951] ? debug_smp_processor_id+0x17/0x20 [ 156.293368][T28951] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 156.299270][T28951] ? exit_to_user_mode_prepare+0x39/0xa0 [ 156.304738][T28951] do_syscall_64+0x3d/0xb0 [ 156.308992][T28951] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 156.314719][T28951] RIP: 0033:0x7f52511e2ae9 [ 156.318974][T28951] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 156.338414][T28951] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 156.346659][T28951] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 10:29:14 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 49) 10:29:14 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/rcu_expedited', 0x101000, 0x126) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f0000001e80)={0x26f0, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x1778, 0x8, 0x0, 0x1, [{0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "6e4680030a5a74709beaa422ae5e51137f9d33267b7c525357b6ed385aedbef0"}]}, {0x7f8, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xad3, @mcast1, 0x2}}, @WGPEER_A_ALLOWEDIPS={0x5a4, 0x9, 0x0, 0x1, [{0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xa}}, {0x5, 0x3, 0x3}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x2}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}]}, {0x118, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x24}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3d}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x41}}, {0x5, 0x3, 0x3}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x1}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x214, 0x9, 0x0, 0x1, [{0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @private=0x1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}]}, {0xf4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xa}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}]}]}]}, {0x438, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xc0, @empty, 0x1}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @empty}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x1e4, 0x9, 0x0, 0x1, [{0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x5, 0x3, 0x3}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xa}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x1f}}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_ALLOWEDIPS={0x1cc, 0x9, 0x0, 0x1, [{0xe8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x32}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}, {0x4c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @loopback}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x59}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "ff95cff186e423892828746af666c404ecdfc36093e0fc2e000c2fc9926c42b4"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7ff}]}, {0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "90ab209c76360aebfe053cfff96a2192600ed6a799e2c50501cca70de913e933"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x2, 0xaaa, @rand_addr=' \x01\x00', 0x1f}}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x4}]}, {0x20c, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x208, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast1}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x2d}}, {0x5, 0x3, 0x1}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x14}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x2}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}]}]}]}, {0x250, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x24c, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @empty}}, {0x5, 0x3, 0x3}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}]}]}]}, {0x58c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x3c8, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x13}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x1c}}, {0x5, 0x3, 0x2}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2e}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x3}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x2}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x1a}}, {0x5, 0x3, 0x2}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x11}}, {0x5, 0x3, 0x2}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2e}}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x4}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @loopback}}, @WGPEER_A_ALLOWEDIPS={0x174, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x1e}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @local}}]}, {0x8c, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "016b8f8541a53eb85521debcf80d84c33127470b43b0d6d303f056c5248a1b1a"}, @WGPEER_A_FLAGS={0x8, 0x3, 0x4}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "cb4deaebfac1af1b77c36857b91ad365e766d06a29f2093f84d5440814014814"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x8, @mcast2, 0x4}}]}]}, @WGDEVICE_A_PEERS={0xf40, 0x8, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x6}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x770, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "7a50d868ab072fdea1a88a1c123b2f7cc9099aea70cd0021a6493ad04ba4f282"}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_ALLOWEDIPS={0x300, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x10}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5, 0x3, 0x2}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast2}}, {0x5, 0x3, 0x1}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_ALLOWEDIPS={0x2d0, 0x9, 0x0, 0x1, [{0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5}}]}, {0x118, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x15}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x12}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x138, 0x9, 0x0, 0x1, [{0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, {0x320, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x2c4, 0x9, 0x0, 0x1, [{0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x3}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x1}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "bdac2bcb20916f7d373436f85ef53a36d90282df61ad928cf66c2241501c19d8"}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x44c, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x440, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3f}}, {0x5, 0x3, 0x2}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}]}, {0x148, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x3d}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x13}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x4}]}, {0x24, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0x6, @private2, 0xffff92bd}}]}]}, @WGDEVICE_A_FLAGS={0x8}]}, 0x26f0}}, 0x20000080) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x40}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20000800) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000080)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000000000)=""/79, 0x4f}, {0x0}], 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)) 10:29:14 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() pipe(&(0x7f0000004100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(0xffffffffffffffff, &(0x7f0000004180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000041c0)=0x14) sendmsg$ETHTOOL_MSG_EEE_GET(r2, &(0x7f0000004280)={&(0x7f0000004140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000004240)={&(0x7f0000004340)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010027bd7000ffdbdf25170000000c00018008000100355c0000bbc7983ac0cf567fd905000000a3a95bd478f866e12ac4678d5991c749d27dac6e46b0909036f1a1706cdebe", @ANYRES32=r3, @ANYBLOB="d42889baa3914b6dcab759a9fe249c5eaea114ddbfb087ebaa1a1cf0a30f2a802f0018f3016afe5c8c23451a86229b53725dc1e2854656aad8daf2a1b23bd1bee332fc9387a31a70242af9a5afd7aea5b3ae4be3ba6f5b402c0fcc2e7f9e4cfc896a4ce30ed0bb5fe217aa22d61b7ef4ea00882fea006b15a636b9d72d37c9536f1e2aabaf877b93eb1dc5b176c9867972678fbbeae5781a1d6def1de14f6b7ce77eb7ae2ad0dabcf18d59b9dea9bd387c2f5b19"], 0x20}, 0x1, 0x0, 0x0, 0x400c000}, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000002080), 0x40001, 0x0) read$FUSE(r4, &(0x7f00000020c0)={0x2020}, 0x2020) syz_open_procfs$userns(r1, 0x0) r5 = getpid() syz_open_procfs$userns(r5, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$userns(r6, &(0x7f0000002040)) process_vm_readv(r5, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() (async) syz_open_procfs$userns(r0, 0x0) (async) getpid() (async) pipe(&(0x7f0000004100)) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000004180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000041c0)=0x14) (async) sendmsg$ETHTOOL_MSG_EEE_GET(r2, &(0x7f0000004280)={&(0x7f0000004140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000004240)={&(0x7f0000004340)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010027bd7000ffdbdf25170000000c00018008000100355c0000bbc7983ac0cf567fd905000000a3a95bd478f866e12ac4678d5991c749d27dac6e46b0909036f1a1706cdebe", @ANYRES32=r3, @ANYBLOB="d42889baa3914b6dcab759a9fe249c5eaea114ddbfb087ebaa1a1cf0a30f2a802f0018f3016afe5c8c23451a86229b53725dc1e2854656aad8daf2a1b23bd1bee332fc9387a31a70242af9a5afd7aea5b3ae4be3ba6f5b402c0fcc2e7f9e4cfc896a4ce30ed0bb5fe217aa22d61b7ef4ea00882fea006b15a636b9d72d37c9536f1e2aabaf877b93eb1dc5b176c9867972678fbbeae5781a1d6def1de14f6b7ce77eb7ae2ad0dabcf18d59b9dea9bd387c2f5b19"], 0x20}, 0x1, 0x0, 0x0, 0x400c000}, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000002080), 0x40001, 0x0) (async) read$FUSE(r4, &(0x7f00000020c0)={0x2020}, 0x2020) (async) syz_open_procfs$userns(r1, 0x0) (async) getpid() (async) syz_open_procfs$userns(r5, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) (async) syz_open_procfs$userns(r6, &(0x7f0000002040)) (async) process_vm_readv(r5, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 10:29:14 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:14 executing program 4: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() pipe(&(0x7f0000004100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(0xffffffffffffffff, &(0x7f0000004180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000041c0)=0x14) sendmsg$ETHTOOL_MSG_EEE_GET(r2, &(0x7f0000004280)={&(0x7f0000004140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000004240)={&(0x7f0000004340)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010027bd7000ffdbdf25170000000c00018008000100355c0000bbc7983ac0cf567fd905000000a3a95bd478f866e12ac4678d5991c749d27dac6e46b0909036f1a1706cdebe", @ANYRES32=r3, @ANYBLOB="d42889baa3914b6dcab759a9fe249c5eaea114ddbfb087ebaa1a1cf0a30f2a802f0018f3016afe5c8c23451a86229b53725dc1e2854656aad8daf2a1b23bd1bee332fc9387a31a70242af9a5afd7aea5b3ae4be3ba6f5b402c0fcc2e7f9e4cfc896a4ce30ed0bb5fe217aa22d61b7ef4ea00882fea006b15a636b9d72d37c9536f1e2aabaf877b93eb1dc5b176c9867972678fbbeae5781a1d6def1de14f6b7ce77eb7ae2ad0dabcf18d59b9dea9bd387c2f5b19"], 0x20}, 0x1, 0x0, 0x0, 0x400c000}, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000002080), 0x40001, 0x0) read$FUSE(r4, &(0x7f00000020c0)={0x2020}, 0x2020) syz_open_procfs$userns(r1, 0x0) r5 = getpid() syz_open_procfs$userns(r5, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$userns(r6, &(0x7f0000002040)) process_vm_readv(r5, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:14 executing program 0: syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) [ 156.354469][T28951] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 156.362280][T28951] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 156.370093][T28951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 156.377903][T28951] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 156.385716][T28951] 10:29:14 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:14 executing program 0: r0 = getpid() pidfd_open(r0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) wait4(r1, &(0x7f0000002040), 0x4, &(0x7f0000002080)) process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:14 executing program 4: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() pipe(&(0x7f0000004100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(0xffffffffffffffff, &(0x7f0000004180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000041c0)=0x14) sendmsg$ETHTOOL_MSG_EEE_GET(r2, &(0x7f0000004280)={&(0x7f0000004140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000004240)={&(0x7f0000004340)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010027bd7000ffdbdf25170000000c00018008000100355c0000bbc7983ac0cf567fd905000000a3a95bd478f866e12ac4678d5991c749d27dac6e46b0909036f1a1706cdebe", @ANYRES32=r3, @ANYBLOB="d42889baa3914b6dcab759a9fe249c5eaea114ddbfb087ebaa1a1cf0a30f2a802f0018f3016afe5c8c23451a86229b53725dc1e2854656aad8daf2a1b23bd1bee332fc9387a31a70242af9a5afd7aea5b3ae4be3ba6f5b402c0fcc2e7f9e4cfc896a4ce30ed0bb5fe217aa22d61b7ef4ea00882fea006b15a636b9d72d37c9536f1e2aabaf877b93eb1dc5b176c9867972678fbbeae5781a1d6def1de14f6b7ce77eb7ae2ad0dabcf18d59b9dea9bd387c2f5b19"], 0x20}, 0x1, 0x0, 0x0, 0x400c000}, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000002080), 0x40001, 0x0) read$FUSE(r4, &(0x7f00000020c0)={0x2020}, 0x2020) syz_open_procfs$userns(r1, 0x0) r5 = getpid() syz_open_procfs$userns(r5, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$userns(r6, &(0x7f0000002040)) process_vm_readv(r5, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:14 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/rcu_expedited', 0x101000, 0x126) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f0000001e80)={0x26f0, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x1778, 0x8, 0x0, 0x1, [{0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "6e4680030a5a74709beaa422ae5e51137f9d33267b7c525357b6ed385aedbef0"}]}, {0x7f8, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xad3, @mcast1, 0x2}}, @WGPEER_A_ALLOWEDIPS={0x5a4, 0x9, 0x0, 0x1, [{0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xa}}, {0x5, 0x3, 0x3}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x2}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}]}, {0x118, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x24}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3d}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x41}}, {0x5, 0x3, 0x3}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x1}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x214, 0x9, 0x0, 0x1, [{0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @private=0x1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}]}, {0xf4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xa}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}]}]}]}, {0x438, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xc0, @empty, 0x1}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @empty}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x1e4, 0x9, 0x0, 0x1, [{0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x5, 0x3, 0x3}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xa}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x1f}}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_ALLOWEDIPS={0x1cc, 0x9, 0x0, 0x1, [{0xe8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x32}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}, {0x4c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @loopback}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x59}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "ff95cff186e423892828746af666c404ecdfc36093e0fc2e000c2fc9926c42b4"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7ff}]}, {0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "90ab209c76360aebfe053cfff96a2192600ed6a799e2c50501cca70de913e933"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x2, 0xaaa, @rand_addr=' \x01\x00', 0x1f}}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x4}]}, {0x20c, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x208, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast1}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x2d}}, {0x5, 0x3, 0x1}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x14}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x2}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}]}]}]}, {0x250, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x24c, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @empty}}, {0x5, 0x3, 0x3}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}]}]}]}, {0x58c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x3c8, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x13}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x1c}}, {0x5, 0x3, 0x2}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2e}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x3}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x2}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x1a}}, {0x5, 0x3, 0x2}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x11}}, {0x5, 0x3, 0x2}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2e}}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x4}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @loopback}}, @WGPEER_A_ALLOWEDIPS={0x174, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x1e}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @local}}]}, {0x8c, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "016b8f8541a53eb85521debcf80d84c33127470b43b0d6d303f056c5248a1b1a"}, @WGPEER_A_FLAGS={0x8, 0x3, 0x4}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "cb4deaebfac1af1b77c36857b91ad365e766d06a29f2093f84d5440814014814"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x8, @mcast2, 0x4}}]}]}, @WGDEVICE_A_PEERS={0xf40, 0x8, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x6}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x770, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "7a50d868ab072fdea1a88a1c123b2f7cc9099aea70cd0021a6493ad04ba4f282"}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_ALLOWEDIPS={0x300, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x10}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5, 0x3, 0x2}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast2}}, {0x5, 0x3, 0x1}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_ALLOWEDIPS={0x2d0, 0x9, 0x0, 0x1, [{0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5}}]}, {0x118, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x15}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x12}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x138, 0x9, 0x0, 0x1, [{0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, {0x320, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x2c4, 0x9, 0x0, 0x1, [{0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x3}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x1}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "bdac2bcb20916f7d373436f85ef53a36d90282df61ad928cf66c2241501c19d8"}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x44c, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x440, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3f}}, {0x5, 0x3, 0x2}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}]}, {0x148, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x3d}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x13}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x4}]}, {0x24, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0x6, @private2, 0xffff92bd}}]}]}, @WGDEVICE_A_FLAGS={0x8}]}, 0x26f0}}, 0x20000080) (async) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x40}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20000800) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000080)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000000000)=""/79, 0x4f}, {0x0}], 0x2, 0x0) (async) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)) [ 156.410021][T28980] FAULT_INJECTION: forcing a failure. [ 156.410021][T28980] name failslab, interval 1, probability 0, space 0, times 0 [ 156.456768][T28980] CPU: 0 PID: 28980 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 156.466928][T28980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 156.476820][T28980] Call Trace: [ 156.479944][T28980] [ 156.482720][T28980] dump_stack_lvl+0x151/0x1b7 [ 156.487232][T28980] ? io_uring_drop_tctx_refs+0x190/0x190 [ 156.492701][T28980] dump_stack+0x15/0x17 [ 156.496693][T28980] should_fail+0x3c6/0x510 [ 156.500943][T28980] __should_failslab+0xa4/0xe0 10:29:14 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() (async) pipe(&(0x7f0000004100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000004180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000041c0)=0x14) sendmsg$ETHTOOL_MSG_EEE_GET(r2, &(0x7f0000004280)={&(0x7f0000004140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000004240)={&(0x7f0000004340)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010027bd7000ffdbdf25170000000c00018008000100355c0000bbc7983ac0cf567fd905000000a3a95bd478f866e12ac4678d5991c749d27dac6e46b0909036f1a1706cdebe", @ANYRES32=r3, @ANYBLOB="d42889baa3914b6dcab759a9fe249c5eaea114ddbfb087ebaa1a1cf0a30f2a802f0018f3016afe5c8c23451a86229b53725dc1e2854656aad8daf2a1b23bd1bee332fc9387a31a70242af9a5afd7aea5b3ae4be3ba6f5b402c0fcc2e7f9e4cfc896a4ce30ed0bb5fe217aa22d61b7ef4ea00882fea006b15a636b9d72d37c9536f1e2aabaf877b93eb1dc5b176c9867972678fbbeae5781a1d6def1de14f6b7ce77eb7ae2ad0dabcf18d59b9dea9bd387c2f5b19"], 0x20}, 0x1, 0x0, 0x0, 0x400c000}, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000002080), 0x40001, 0x0) read$FUSE(r4, &(0x7f00000020c0)={0x2020}, 0x2020) (async) syz_open_procfs$userns(r1, 0x0) r5 = getpid() syz_open_procfs$userns(r5, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$userns(r6, &(0x7f0000002040)) process_vm_readv(r5, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:14 executing program 0: r0 = getpid() pidfd_open(r0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) wait4(r1, &(0x7f0000002040), 0x4, &(0x7f0000002080)) process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:15 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 50) 10:29:15 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:15 executing program 0: r0 = getpid() pidfd_open(r0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) wait4(r1, &(0x7f0000002040), 0x4, &(0x7f0000002080)) process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:15 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/rcu_expedited', 0x101000, 0x126) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f0000001e80)={0x26f0, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x1778, 0x8, 0x0, 0x1, [{0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "6e4680030a5a74709beaa422ae5e51137f9d33267b7c525357b6ed385aedbef0"}]}, {0x7f8, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xad3, @mcast1, 0x2}}, @WGPEER_A_ALLOWEDIPS={0x5a4, 0x9, 0x0, 0x1, [{0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xa}}, {0x5, 0x3, 0x3}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x2}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}]}, {0x118, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x24}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3d}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x41}}, {0x5, 0x3, 0x3}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x1}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x214, 0x9, 0x0, 0x1, [{0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @private=0x1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}]}, {0xf4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xa}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}]}]}]}, {0x438, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xc0, @empty, 0x1}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @empty}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x1e4, 0x9, 0x0, 0x1, [{0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x5, 0x3, 0x3}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xa}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x1f}}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_ALLOWEDIPS={0x1cc, 0x9, 0x0, 0x1, [{0xe8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x32}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x1f}}, {0x5, 0x3, 0x1}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}]}]}, {0x4c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @loopback}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x59}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "ff95cff186e423892828746af666c404ecdfc36093e0fc2e000c2fc9926c42b4"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7ff}]}, {0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "90ab209c76360aebfe053cfff96a2192600ed6a799e2c50501cca70de913e933"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x2, 0xaaa, @rand_addr=' \x01\x00', 0x1f}}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x4}]}, {0x20c, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x208, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast1}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x2d}}, {0x5, 0x3, 0x1}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x14}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x2}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}]}]}]}, {0x250, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x24c, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @empty}}, {0x5, 0x3, 0x3}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}]}]}]}, {0x58c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x3c8, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x13}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x1c}}, {0x5, 0x3, 0x2}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2e}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x3}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x2}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x1a}}, {0x5, 0x3, 0x2}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x11}}, {0x5, 0x3, 0x2}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2e}}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x4}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @loopback}}, @WGPEER_A_ALLOWEDIPS={0x174, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x1e}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @local}}]}, {0x8c, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "016b8f8541a53eb85521debcf80d84c33127470b43b0d6d303f056c5248a1b1a"}, @WGPEER_A_FLAGS={0x8, 0x3, 0x4}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "cb4deaebfac1af1b77c36857b91ad365e766d06a29f2093f84d5440814014814"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x8, @mcast2, 0x4}}]}]}, @WGDEVICE_A_PEERS={0xf40, 0x8, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x6}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x770, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "7a50d868ab072fdea1a88a1c123b2f7cc9099aea70cd0021a6493ad04ba4f282"}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_ALLOWEDIPS={0x300, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x10}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5, 0x3, 0x2}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast2}}, {0x5, 0x3, 0x1}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_ALLOWEDIPS={0x2d0, 0x9, 0x0, 0x1, [{0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5}}]}, {0x118, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x15}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x12}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x138, 0x9, 0x0, 0x1, [{0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, {0x320, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x2c4, 0x9, 0x0, 0x1, [{0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x3}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x1}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "bdac2bcb20916f7d373436f85ef53a36d90282df61ad928cf66c2241501c19d8"}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x44c, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x440, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3f}}, {0x5, 0x3, 0x2}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}]}, {0x148, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x3d}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x13}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x4}]}, {0x24, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0x6, @private2, 0xffff92bd}}]}]}, @WGDEVICE_A_FLAGS={0x8}]}, 0x26f0}}, 0x20000080) (async) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x40}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20000800) (async) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000080)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000000000)=""/79, 0x4f}, {0x0}], 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)) 10:29:15 executing program 5: sendmsg$IEEE802154_DISASSOCIATE_REQ(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x8, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4084) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x0) mount_setattr(r0, &(0x7f0000000040)='./file0\x00', 0x9800, &(0x7f0000000080)={0xa, 0x100000, 0x180000}, 0x20) 10:29:15 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, 0x0) process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) [ 156.505547][T28980] ? anon_vma_clone+0x9a/0x500 [ 156.510147][T28980] should_failslab+0x9/0x20 [ 156.514497][T28980] slab_pre_alloc_hook+0x37/0xd0 [ 156.514525][T28980] ? anon_vma_clone+0x9a/0x500 [ 156.514554][T28980] kmem_cache_alloc+0x44/0x200 [ 156.514571][T28980] anon_vma_clone+0x9a/0x500 [ 156.514591][T28980] anon_vma_fork+0x91/0x4e0 [ 156.514609][T28980] ? anon_vma_name+0x4c/0x70 10:29:15 executing program 5: sendmsg$IEEE802154_DISASSOCIATE_REQ(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x8, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4084) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x0) mount_setattr(r0, &(0x7f0000000040)='./file0\x00', 0x9800, &(0x7f0000000080)={0xa, 0x100000, 0x180000}, 0x20) sendmsg$IEEE802154_DISASSOCIATE_REQ(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x8, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4084) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x0) (async) mount_setattr(r0, &(0x7f0000000040)='./file0\x00', 0x9800, &(0x7f0000000080)={0xa, 0x100000, 0x180000}, 0x20) (async) 10:29:15 executing program 3: ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000000c0)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) process_vm_readv(0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/62, 0xffffffffffffff4d}], 0x1, &(0x7f0000001e40), 0x0, 0x0) [ 156.514627][T28980] ? vm_area_dup+0x17a/0x230 [ 156.514646][T28980] dup_mm+0x8c5/0x12c0 [ 156.514666][T28980] ? copy_init_mm+0x20/0x20 [ 156.514685][T28980] copy_mm+0x107/0x1b0 [ 156.514703][T28980] copy_process+0x12bc/0x3260 [ 156.514726][T28980] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 156.514744][T28980] ? copy_clone_args_from_user+0x744/0x830 [ 156.514765][T28980] kernel_clone+0x21e/0x9e0 [ 156.514783][T28980] ? __delayed_free_task+0x20/0x20 [ 156.514801][T28980] ? vfs_write+0x9ec/0x1110 [ 156.514820][T28980] ? create_io_thread+0x1e0/0x1e0 [ 156.514840][T28980] __x64_sys_clone3+0x376/0x3a0 [ 156.514859][T28980] ? __ia32_sys_clone+0x290/0x290 [ 156.514880][T28980] ? fput+0x1a/0x20 [ 156.514897][T28980] ? debug_smp_processor_id+0x17/0x20 [ 156.514917][T28980] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 156.514936][T28980] ? exit_to_user_mode_prepare+0x39/0xa0 [ 156.514953][T28980] do_syscall_64+0x3d/0xb0 [ 156.514970][T28980] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 156.514987][T28980] RIP: 0033:0x7f52511e2ae9 [ 156.515003][T28980] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 156.515018][T28980] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 156.515039][T28980] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 156.515051][T28980] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 156.515064][T28980] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 156.515076][T28980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 156.515088][T28980] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 156.515103][T28980] [ 156.599626][T29034] FAULT_INJECTION: forcing a failure. [ 156.599626][T29034] name failslab, interval 1, probability 0, space 0, times 0 [ 156.599653][T29034] CPU: 0 PID: 29034 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 156.599676][T29034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 156.599687][T29034] Call Trace: [ 156.599693][T29034] [ 156.599700][T29034] dump_stack_lvl+0x151/0x1b7 [ 156.599724][T29034] ? io_uring_drop_tctx_refs+0x190/0x190 [ 156.599746][T29034] dump_stack+0x15/0x17 [ 156.599765][T29034] should_fail+0x3c6/0x510 [ 156.599788][T29034] __should_failslab+0xa4/0xe0 [ 156.599806][T29034] ? vm_area_dup+0x26/0x230 [ 156.599825][T29034] should_failslab+0x9/0x20 [ 156.599841][T29034] slab_pre_alloc_hook+0x37/0xd0 [ 156.599859][T29034] ? vm_area_dup+0x26/0x230 [ 156.599873][T29034] kmem_cache_alloc+0x44/0x200 [ 156.599889][T29034] vm_area_dup+0x26/0x230 [ 156.599904][T29034] dup_mm+0x81b/0x12c0 [ 156.599923][T29034] ? copy_init_mm+0x20/0x20 [ 156.599942][T29034] copy_mm+0x107/0x1b0 [ 156.599959][T29034] copy_process+0x12bc/0x3260 [ 156.599981][T29034] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 156.599999][T29034] ? copy_clone_args_from_user+0x744/0x830 [ 156.600019][T29034] kernel_clone+0x21e/0x9e0 [ 156.600035][T29034] ? __delayed_free_task+0x20/0x20 [ 156.600053][T29034] ? vfs_write+0x9ec/0x1110 [ 156.600071][T29034] ? create_io_thread+0x1e0/0x1e0 [ 156.600090][T29034] __x64_sys_clone3+0x376/0x3a0 [ 156.600108][T29034] ? __ia32_sys_clone+0x290/0x290 [ 156.600125][T29034] ? fput+0x1a/0x20 [ 156.600141][T29034] ? debug_smp_processor_id+0x17/0x20 [ 156.600159][T29034] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 156.600179][T29034] ? exit_to_user_mode_prepare+0x39/0xa0 [ 156.600198][T29034] do_syscall_64+0x3d/0xb0 [ 156.600214][T29034] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 156.600232][T29034] RIP: 0033:0x7f52511e2ae9 [ 156.600247][T29034] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 156.600263][T29034] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 156.600284][T29034] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 10:29:15 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, 0x0) process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:15 executing program 4: sendmsg$IEEE802154_DISASSOCIATE_REQ(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x8, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4084) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x0) mount_setattr(r0, &(0x7f0000000040)='./file0\x00', 0x9800, &(0x7f0000000080)={0xa, 0x100000, 0x180000}, 0x20) 10:29:15 executing program 0: r0 = getpid() pidfd_open(r0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) wait4(r1, &(0x7f0000002040), 0x4, &(0x7f0000002080)) 10:29:15 executing program 5: sendmsg$IEEE802154_DISASSOCIATE_REQ(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x8, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4084) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x0) mount_setattr(r0, &(0x7f0000000040)='./file0\x00', 0x9800, &(0x7f0000000080)={0xa, 0x100000, 0x180000}, 0x20) 10:29:15 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 51) 10:29:15 executing program 3: ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000000c0)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) process_vm_readv(0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/62, 0xffffffffffffff4d}], 0x1, &(0x7f0000001e40), 0x0, 0x0) (async) process_vm_readv(0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/62, 0xffffffffffffff4d}], 0x1, &(0x7f0000001e40), 0x0, 0x0) 10:29:15 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000000), 0x2, &(0x7f0000000040)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) [ 156.600297][T29034] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 156.600310][T29034] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 156.600322][T29034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 156.600332][T29034] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 156.600346][T29034] 10:29:15 executing program 0: r0 = getpid() pidfd_open(r0, 0x0) wait4(0x0, &(0x7f0000002040), 0x4, &(0x7f0000002080)) 10:29:15 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, 0x0) process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:15 executing program 1: getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:15 executing program 4: sendmsg$IEEE802154_DISASSOCIATE_REQ(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x8, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4084) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x0) mount_setattr(r0, &(0x7f0000000040)='./file0\x00', 0x9800, &(0x7f0000000080)={0xa, 0x100000, 0x180000}, 0x20) 10:29:15 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) wait4(0xffffffffffffffff, &(0x7f0000000000), 0x2, &(0x7f0000000040)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 10:29:15 executing program 3: ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000000c0)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) process_vm_readv(0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/62, 0xffffffffffffff4d}], 0x1, &(0x7f0000001e40), 0x0, 0x0) [ 157.041449][T29043] FAULT_INJECTION: forcing a failure. [ 157.041449][T29043] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 157.086717][T29043] CPU: 1 PID: 29043 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 157.096963][T29043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 157.106860][T29043] Call Trace: [ 157.109982][T29043] [ 157.112758][T29043] dump_stack_lvl+0x151/0x1b7 [ 157.117276][T29043] ? io_uring_drop_tctx_refs+0x190/0x190 [ 157.122741][T29043] ? __update_load_avg_cfs_rq+0xb1/0x2f0 [ 157.128211][T29043] dump_stack+0x15/0x17 [ 157.132199][T29043] should_fail+0x3c6/0x510 10:29:15 executing program 0: getpid() wait4(0x0, &(0x7f0000002040), 0x4, &(0x7f0000002080)) 10:29:15 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140)={r0, r1, 0x1e}, 0x10) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000180)={0xffffffffffffffff, 0x9, 0x3, 0x4}) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f00000001c0)) 10:29:15 executing program 0: wait4(0x0, &(0x7f0000002040), 0x4, &(0x7f0000002080)) 10:29:15 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140)={r0, r1, 0x1e}, 0x10) (async) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) (async) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) (async) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000180)={0xffffffffffffffff, 0x9, 0x3, 0x4}) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f00000001c0)) [ 157.136460][T29043] should_fail_alloc_page+0x5a/0x80 [ 157.141526][T29043] prepare_alloc_pages+0x15c/0x700 [ 157.146438][T29043] ? __alloc_pages_bulk+0xf50/0xf50 [ 157.151500][T29043] ? sched_clock+0x9/0x10 [ 157.155903][T29043] __alloc_pages+0x138/0x5e0 [ 157.160321][T29043] ? zone_watermark_fast+0x220/0x220 [ 157.165449][T29043] ? is_bpf_text_address+0x172/0x190 [ 157.170563][T29043] pte_alloc_one+0x73/0x1b0 [ 157.174911][T29043] ? pfn_modify_allowed+0x2f0/0x2f0 [ 157.179934][T29043] ? arch_stack_walk+0xf3/0x140 [ 157.184629][T29043] __pte_alloc+0x86/0x350 [ 157.188795][T29043] ? free_pgtables+0x280/0x280 [ 157.193383][T29043] ? _raw_spin_lock+0xa4/0x1b0 [ 157.197985][T29043] ? __kasan_check_write+0x14/0x20 [ 157.202930][T29043] copy_page_range+0x28a8/0x2f90 [ 157.207702][T29043] ? __kasan_slab_alloc+0xb1/0xe0 [ 157.212570][T29043] ? pfn_valid+0x1e0/0x1e0 [ 157.216829][T29043] ? vma_gap_callbacks_rotate+0x1b7/0x210 [ 157.222372][T29043] ? __rb_insert_augmented+0x5de/0x610 [ 157.227759][T29043] dup_mm+0xadc/0x12c0 [ 157.231665][T29043] ? copy_init_mm+0x20/0x20 [ 157.236004][T29043] copy_mm+0x107/0x1b0 [ 157.239915][T29043] copy_process+0x12bc/0x3260 [ 157.244445][T29043] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 157.249390][T29043] ? copy_clone_args_from_user+0x744/0x830 [ 157.255013][T29043] kernel_clone+0x21e/0x9e0 [ 157.259370][T29043] ? __delayed_free_task+0x20/0x20 [ 157.264297][T29043] ? vfs_write+0x9ec/0x1110 [ 157.268637][T29043] ? create_io_thread+0x1e0/0x1e0 [ 157.273503][T29043] __x64_sys_clone3+0x376/0x3a0 [ 157.278183][T29043] ? __ia32_sys_clone+0x290/0x290 [ 157.283044][T29043] ? fput+0x1a/0x20 [ 157.286694][T29043] ? debug_smp_processor_id+0x17/0x20 [ 157.291900][T29043] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 157.297796][T29043] ? exit_to_user_mode_prepare+0x39/0xa0 [ 157.303265][T29043] do_syscall_64+0x3d/0xb0 [ 157.307519][T29043] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 157.313248][T29043] RIP: 0033:0x7f52511e2ae9 [ 157.317514][T29043] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 10:29:15 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 52) 10:29:15 executing program 0: wait4(0x0, 0x0, 0x4, &(0x7f0000002080)) 10:29:15 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140)={r0, r1, 0x1e}, 0x10) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140)={r0, r1, 0x1e}, 0x10) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000180)={0xffffffffffffffff, 0x9, 0x3, 0x4}) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f00000001c0)) (async) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f00000001c0)) 10:29:15 executing program 1: getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:15 executing program 4: sendmsg$IEEE802154_DISASSOCIATE_REQ(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x8, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4084) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x0) mount_setattr(r0, &(0x7f0000000040)='./file0\x00', 0x9800, &(0x7f0000000080)={0xa, 0x100000, 0x180000}, 0x20) 10:29:15 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000000), 0x2, &(0x7f0000000040)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) wait4(0xffffffffffffffff, &(0x7f0000000000), 0x2, &(0x7f0000000040)) (async) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) (async) [ 157.336944][T29043] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 157.345187][T29043] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 157.353000][T29043] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 157.360809][T29043] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 157.368795][T29043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 157.376604][T29043] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 157.384423][T29043] 10:29:15 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:15 executing program 0: wait4(0x0, 0x0, 0x0, &(0x7f0000002080)) 10:29:15 executing program 1: getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) [ 157.399410][T29079] FAULT_INJECTION: forcing a failure. [ 157.399410][T29079] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 157.419505][T29079] CPU: 1 PID: 29079 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 157.429668][T29079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 157.439565][T29079] Call Trace: [ 157.442688][T29079] 10:29:15 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000180)={{0x0, 0x934, 0xffff, 0x6, 0x4, 0x600000000000000, 0x5, 0x0, 0x8000, 0x400, 0x6, 0x40, 0x0, 0x0, 0x40}}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1000}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x81}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x4}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x4004000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001180)='/sys/class/cpuid', 0x0, 0x84) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000001200), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f00000012c0)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001280)={&(0x7f0000001240)={0x30, r2, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xac}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}]}, 0x30}, 0x1, 0x0, 0x0, 0x804}, 0x20000000) 10:29:15 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000180)={{0x0, 0x934, 0xffff, 0x6, 0x4, 0x600000000000000, 0x5, 0x0, 0x8000, 0x400, 0x6, 0x40, 0x0, 0x0, 0x40}}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) (async) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1000}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x81}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x4}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x4004000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001180)='/sys/class/cpuid', 0x0, 0x84) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000001200), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f00000012c0)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001280)={&(0x7f0000001240)={0x30, r2, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xac}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}]}, 0x30}, 0x1, 0x0, 0x0, 0x804}, 0x20000000) 10:29:15 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000180)={{0x0, 0x934, 0xffff, 0x6, 0x4, 0x600000000000000, 0x5, 0x0, 0x8000, 0x400, 0x6, 0x40, 0x0, 0x0, 0x40}}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) (async) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1000}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x81}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x4}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x4004000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001180)='/sys/class/cpuid', 0x0, 0x84) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000001200), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f00000012c0)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001280)={&(0x7f0000001240)={0x30, r2, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xac}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}]}, 0x30}, 0x1, 0x0, 0x0, 0x804}, 0x20000000) [ 157.445464][T29079] dump_stack_lvl+0x151/0x1b7 [ 157.449977][T29079] ? io_uring_drop_tctx_refs+0x190/0x190 [ 157.455451][T29079] dump_stack+0x15/0x17 [ 157.459441][T29079] should_fail+0x3c6/0x510 [ 157.463692][T29079] should_fail_alloc_page+0x5a/0x80 [ 157.468725][T29079] prepare_alloc_pages+0x15c/0x700 [ 157.473674][T29079] ? __alloc_pages_bulk+0xf50/0xf50 [ 157.478708][T29079] __alloc_pages+0x138/0x5e0 [ 157.483133][T29079] ? stack_trace_save+0x1c0/0x1c0 [ 157.487993][T29079] ? zone_watermark_fast+0x220/0x220 [ 157.493113][T29079] get_zeroed_page+0x19/0x40 [ 157.497541][T29079] __pud_alloc+0x8b/0x260 [ 157.501708][T29079] ? stack_trace_snprint+0xf0/0xf0 [ 157.506656][T29079] ? do_handle_mm_fault+0x2330/0x2330 [ 157.511860][T29079] ? __stack_depot_save+0x34/0x470 [ 157.516805][T29079] ? anon_vma_clone+0x9a/0x500 [ 157.521416][T29079] copy_page_range+0x2bcf/0x2f90 [ 157.526180][T29079] ? __kasan_slab_alloc+0xb1/0xe0 [ 157.531040][T29079] ? slab_post_alloc_hook+0x53/0x2c0 [ 157.536163][T29079] ? dup_mm+0x8c5/0x12c0 [ 157.540239][T29079] ? copy_mm+0x107/0x1b0 [ 157.544320][T29079] ? copy_process+0x12bc/0x3260 [ 157.549010][T29079] ? kernel_clone+0x21e/0x9e0 [ 157.553518][T29079] ? __x64_sys_clone3+0x376/0x3a0 [ 157.558380][T29079] ? do_syscall_64+0x3d/0xb0 [ 157.562811][T29079] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 157.568707][T29079] ? pfn_valid+0x1e0/0x1e0 [ 157.572958][T29079] ? rwsem_write_trylock+0x15b/0x290 [ 157.578078][T29079] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 157.584326][T29079] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 157.589879][T29079] ? __rb_insert_augmented+0x5de/0x610 [ 157.595174][T29079] dup_mm+0xadc/0x12c0 [ 157.599084][T29079] ? copy_init_mm+0x20/0x20 [ 157.603420][T29079] copy_mm+0x107/0x1b0 [ 157.607323][T29079] copy_process+0x12bc/0x3260 [ 157.611845][T29079] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 157.616785][T29079] ? copy_clone_args_from_user+0x744/0x830 [ 157.622429][T29079] kernel_clone+0x21e/0x9e0 [ 157.626765][T29079] ? __delayed_free_task+0x20/0x20 [ 157.631713][T29079] ? vfs_write+0x9ec/0x1110 [ 157.636054][T29079] ? create_io_thread+0x1e0/0x1e0 [ 157.640914][T29079] __x64_sys_clone3+0x376/0x3a0 [ 157.645601][T29079] ? __ia32_sys_clone+0x290/0x290 [ 157.650460][T29079] ? fput+0x1a/0x20 [ 157.654104][T29079] ? debug_smp_processor_id+0x17/0x20 [ 157.659313][T29079] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 157.665215][T29079] ? exit_to_user_mode_prepare+0x39/0xa0 [ 157.670684][T29079] do_syscall_64+0x3d/0xb0 [ 157.674935][T29079] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 157.680664][T29079] RIP: 0033:0x7f52511e2ae9 [ 157.684917][T29079] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 157.704361][T29079] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 157.712600][T29079] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 157.720416][T29079] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 157.728225][T29079] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 157.736035][T29079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:29:16 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 53) 10:29:16 executing program 4: sendmsg$IEEE802154_DISASSOCIATE_REQ(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x8, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4084) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount_setattr(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x9800, &(0x7f0000000080)={0xa, 0x100000, 0x180000}, 0x20) 10:29:16 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/firmware_class', 0x0, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40011}, 0x8000) r2 = open(0x0, 0x680002, 0x0) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) write$khugepaged_scan(r3, &(0x7f0000000740), 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000500)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00', 0x0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000780)=ANY=[@ANYBLOB="d4010000", @ANYRES16=0x0, @ANYBLOB="200026bd7000fedbdf25150000000c00018008000300020000006800018008000100", @ANYRES32=0x0, @ANYBLOB="140002006d6163736563300000000000000000001400020070696d7265670000000000000000000008000300010000000800030001000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="1400020076657468315f746f5f626f6e64000000040001803c0001800800030004000000140002006d6163766c616e30000000000000000008000300000000001400020076657468305f746f5f626f6e640000003800018008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c657230000000000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="080021005e50754680ac366ea7a0f3afaf152d898003a1f6017ac44edf2f529def49", @ANYRES32=0x0, @ANYBLOB="6c0001801400020076657468315f746f5f6873720000000008000300000000000800030002000000080003000700000008000100", @ANYRES32=0x0, @ANYBLOB="140002006e657464657673696d3000000000000008000100", @ANYRES32=r4, @ANYBLOB="080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="4c00018014000200766574683000000000000000000000000800030001000000080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="0800030000000000140002007663616e3000000000000000000000001c00018008000100", @ANYRES32=r5, @ANYBLOB="080003000300000008000100", @ANYRES32=r6, @ANYBLOB], 0x1d4}, 0x1, 0x0, 0x0, 0x4000000}, 0x8001) 10:29:16 executing program 0: wait4(0x0, 0x0, 0x0, &(0x7f0000002080)) 10:29:16 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:16 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async, rerun: 32) r0 = getpid() (rerun: 32) process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) [ 157.743848][T29079] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 157.751660][T29079] 10:29:16 executing program 4: sendmsg$IEEE802154_DISASSOCIATE_REQ(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x8, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4084) mount_setattr(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x9800, &(0x7f0000000080)={0xa, 0x100000, 0x180000}, 0x20) 10:29:16 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) (async, rerun: 32) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/firmware_class', 0x0, 0x0) (rerun: 32) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40011}, 0x8000) r2 = open(0x0, 0x680002, 0x0) (async, rerun: 64) r3 = open(0x0, 0x680002, 0x0) (rerun: 64) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) write$khugepaged_scan(r3, &(0x7f0000000740), 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) (async) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000500)) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', 0x0}) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00', 0x0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000780)=ANY=[@ANYBLOB="d4010000", @ANYRES16=0x0, @ANYBLOB="200026bd7000fedbdf25150000000c00018008000300020000006800018008000100", @ANYRES32=0x0, @ANYBLOB="140002006d6163736563300000000000000000001400020070696d7265670000000000000000000008000300010000000800030001000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="1400020076657468315f746f5f626f6e64000000040001803c0001800800030004000000140002006d6163766c616e30000000000000000008000300000000001400020076657468305f746f5f626f6e640000003800018008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c657230000000000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="080021005e50754680ac366ea7a0f3afaf152d898003a1f6017ac44edf2f529def49", @ANYRES32=0x0, @ANYBLOB="6c0001801400020076657468315f746f5f6873720000000008000300000000000800030002000000080003000700000008000100", @ANYRES32=0x0, @ANYBLOB="140002006e657464657673696d3000000000000008000100", @ANYRES32=r4, @ANYBLOB="080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="4c00018014000200766574683000000000000000000000000800030001000000080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="0800030000000000140002007663616e3000000000000000000000001c00018008000100", @ANYRES32=r5, @ANYBLOB="080003000300000008000100", @ANYRES32=r6, @ANYBLOB], 0x1d4}, 0x1, 0x0, 0x0, 0x4000000}, 0x8001) 10:29:16 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) (async) process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:16 executing program 0: wait4(0x0, 0x0, 0x0, &(0x7f0000002080)) [ 157.773899][T29118] FAULT_INJECTION: forcing a failure. [ 157.773899][T29118] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 157.787832][T29118] CPU: 1 PID: 29118 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 157.797989][T29118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 157.807885][T29118] Call Trace: [ 157.811007][T29118] [ 157.813788][T29118] dump_stack_lvl+0x151/0x1b7 [ 157.818299][T29118] ? io_uring_drop_tctx_refs+0x190/0x190 10:29:16 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 10:29:16 executing program 0: wait4(0x0, 0x0, 0x4, 0x0) [ 157.823767][T29118] dump_stack+0x15/0x17 [ 157.827760][T29118] should_fail+0x3c6/0x510 [ 157.832015][T29118] should_fail_alloc_page+0x5a/0x80 [ 157.837049][T29118] prepare_alloc_pages+0x15c/0x700 [ 157.841999][T29118] ? __alloc_pages_bulk+0xf50/0xf50 [ 157.847026][T29118] __alloc_pages+0x138/0x5e0 [ 157.851455][T29118] ? stack_trace_save+0x1c0/0x1c0 [ 157.856313][T29118] ? zone_watermark_fast+0x220/0x220 [ 157.861442][T29118] get_zeroed_page+0x19/0x40 [ 157.865859][T29118] __pud_alloc+0x8b/0x260 [ 157.870027][T29118] ? stack_trace_snprint+0xf0/0xf0 [ 157.874977][T29118] ? do_handle_mm_fault+0x2330/0x2330 [ 157.880177][T29118] ? __stack_depot_save+0x34/0x470 [ 157.885127][T29118] ? anon_vma_clone+0x9a/0x500 [ 157.889733][T29118] copy_page_range+0x2bcf/0x2f90 [ 157.894503][T29118] ? __kasan_slab_alloc+0xb1/0xe0 [ 157.899362][T29118] ? slab_post_alloc_hook+0x53/0x2c0 [ 157.904478][T29118] ? dup_mm+0x8c5/0x12c0 [ 157.908556][T29118] ? copy_mm+0x107/0x1b0 [ 157.912635][T29118] ? copy_process+0x12bc/0x3260 [ 157.917322][T29118] ? kernel_clone+0x21e/0x9e0 [ 157.921837][T29118] ? __x64_sys_clone3+0x376/0x3a0 [ 157.926696][T29118] ? do_syscall_64+0x3d/0xb0 [ 157.931121][T29118] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 157.937032][T29118] ? pfn_valid+0x1e0/0x1e0 [ 157.941277][T29118] ? rwsem_write_trylock+0x15b/0x290 [ 157.946401][T29118] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 157.952647][T29118] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 157.958203][T29118] ? __rb_insert_augmented+0x5de/0x610 [ 157.963499][T29118] dup_mm+0xadc/0x12c0 [ 157.967403][T29118] ? copy_init_mm+0x20/0x20 [ 157.971743][T29118] copy_mm+0x107/0x1b0 [ 157.975647][T29118] copy_process+0x12bc/0x3260 [ 157.980162][T29118] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 157.985109][T29118] ? copy_clone_args_from_user+0x744/0x830 [ 157.990752][T29118] kernel_clone+0x21e/0x9e0 [ 157.995089][T29118] ? __delayed_free_task+0x20/0x20 [ 158.000034][T29118] ? vfs_write+0x9ec/0x1110 [ 158.004374][T29118] ? create_io_thread+0x1e0/0x1e0 [ 158.009236][T29118] __x64_sys_clone3+0x376/0x3a0 [ 158.013923][T29118] ? __ia32_sys_clone+0x290/0x290 [ 158.018785][T29118] ? fput+0x1a/0x20 [ 158.022430][T29118] ? debug_smp_processor_id+0x17/0x20 [ 158.027635][T29118] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 158.033535][T29118] ? exit_to_user_mode_prepare+0x39/0xa0 [ 158.039005][T29118] do_syscall_64+0x3d/0xb0 [ 158.043257][T29118] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 158.048986][T29118] RIP: 0033:0x7f52511e2ae9 [ 158.053240][T29118] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 10:29:16 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 54) 10:29:16 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:16 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:16 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:16 executing program 4: mount_setattr(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x9800, &(0x7f0000000080)={0xa, 0x100000, 0x180000}, 0x20) 10:29:16 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) [ 158.072680][T29118] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 158.080925][T29118] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 158.088739][T29118] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 158.096546][T29118] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 158.104361][T29118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 158.112168][T29118] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 158.119985][T29118] 10:29:16 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:16 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/firmware_class', 0x0, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40011}, 0x8000) (async) r2 = open(0x0, 0x680002, 0x0) (async) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) (async) write$khugepaged_scan(r3, &(0x7f0000000740), 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) (async) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000500)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00', 0x0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000780)=ANY=[@ANYBLOB="d4010000", @ANYRES16=0x0, @ANYBLOB="200026bd7000fedbdf25150000000c00018008000300020000006800018008000100", @ANYRES32=0x0, @ANYBLOB="140002006d6163736563300000000000000000001400020070696d7265670000000000000000000008000300010000000800030001000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="1400020076657468315f746f5f626f6e64000000040001803c0001800800030004000000140002006d6163766c616e30000000000000000008000300000000001400020076657468305f746f5f626f6e640000003800018008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c657230000000000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="080021005e50754680ac366ea7a0f3afaf152d898003a1f6017ac44edf2f529def49", @ANYRES32=0x0, @ANYBLOB="6c0001801400020076657468315f746f5f6873720000000008000300000000000800030002000000080003000700000008000100", @ANYRES32=0x0, @ANYBLOB="140002006e657464657673696d3000000000000008000100", @ANYRES32=r4, @ANYBLOB="080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="4c00018014000200766574683000000000000000000000000800030001000000080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="0800030000000000140002007663616e3000000000000000000000001c00018008000100", @ANYRES32=r5, @ANYBLOB="080003000300000008000100", @ANYRES32=r6, @ANYBLOB], 0x1d4}, 0x1, 0x0, 0x0, 0x4000000}, 0x8001) 10:29:16 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async, rerun: 64) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) (rerun: 64) 10:29:16 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x9800, &(0x7f0000000080)={0xa, 0x100000, 0x180000}, 0x20) 10:29:16 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:16 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async, rerun: 64) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) (rerun: 64) [ 158.189736][T29159] FAULT_INJECTION: forcing a failure. [ 158.189736][T29159] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 158.213896][T29159] CPU: 0 PID: 29159 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 158.224064][T29159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 158.234052][T29159] Call Trace: [ 158.237160][T29159] [ 158.239934][T29159] dump_stack_lvl+0x151/0x1b7 [ 158.244451][T29159] ? io_uring_drop_tctx_refs+0x190/0x190 [ 158.249918][T29159] dump_stack+0x15/0x17 [ 158.253909][T29159] should_fail+0x3c6/0x510 [ 158.258164][T29159] should_fail_alloc_page+0x5a/0x80 [ 158.263195][T29159] prepare_alloc_pages+0x15c/0x700 [ 158.268144][T29159] ? __alloc_pages_bulk+0xf50/0xf50 [ 158.273178][T29159] ? __alloc_pages+0x5e0/0x5e0 [ 158.277777][T29159] __alloc_pages+0x138/0x5e0 [ 158.282204][T29159] ? zone_watermark_fast+0x220/0x220 [ 158.287347][T29159] ? __alloc_pages+0x206/0x5e0 [ 158.291925][T29159] ? zone_watermark_fast+0x220/0x220 [ 158.297046][T29159] ? __kasan_check_write+0x14/0x20 [ 158.301990][T29159] ? _raw_spin_lock+0xa4/0x1b0 [ 158.306592][T29159] pte_alloc_one+0x73/0x1b0 [ 158.310930][T29159] ? pfn_modify_allowed+0x2f0/0x2f0 [ 158.315963][T29159] ? __pmd_alloc+0x48d/0x550 [ 158.320394][T29159] __pte_alloc+0x86/0x350 [ 158.324555][T29159] ? __pud_alloc+0x260/0x260 [ 158.328983][T29159] ? __pud_alloc+0x213/0x260 [ 158.333409][T29159] ? free_pgtables+0x280/0x280 [ 158.338009][T29159] ? do_handle_mm_fault+0x2330/0x2330 [ 158.343220][T29159] ? __stack_depot_save+0x34/0x470 [ 158.348163][T29159] ? anon_vma_clone+0x9a/0x500 [ 158.352764][T29159] copy_page_range+0x28a8/0x2f90 [ 158.357537][T29159] ? __kasan_slab_alloc+0xb1/0xe0 [ 158.362398][T29159] ? slab_post_alloc_hook+0x53/0x2c0 [ 158.367568][T29159] ? copy_process+0x12bc/0x3260 [ 158.372204][T29159] ? __x64_sys_clone3+0x376/0x3a0 [ 158.377068][T29159] ? do_syscall_64+0x3d/0xb0 [ 158.381492][T29159] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 158.387402][T29159] ? pfn_valid+0x1e0/0x1e0 [ 158.391645][T29159] ? rwsem_write_trylock+0x15b/0x290 [ 158.396768][T29159] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 158.403016][T29159] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 158.408571][T29159] ? __rb_insert_augmented+0x5de/0x610 [ 158.413868][T29159] dup_mm+0xadc/0x12c0 [ 158.417773][T29159] ? copy_init_mm+0x20/0x20 [ 158.422110][T29159] copy_mm+0x107/0x1b0 [ 158.426017][T29159] copy_process+0x12bc/0x3260 [ 158.430530][T29159] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 158.435478][T29159] ? copy_clone_args_from_user+0x744/0x830 [ 158.441122][T29159] kernel_clone+0x21e/0x9e0 [ 158.445458][T29159] ? __delayed_free_task+0x20/0x20 [ 158.450405][T29159] ? vfs_write+0x9ec/0x1110 [ 158.454744][T29159] ? create_io_thread+0x1e0/0x1e0 [ 158.459609][T29159] __x64_sys_clone3+0x376/0x3a0 [ 158.464292][T29159] ? __ia32_sys_clone+0x290/0x290 [ 158.469153][T29159] ? fput+0x1a/0x20 [ 158.472802][T29159] ? debug_smp_processor_id+0x17/0x20 [ 158.478003][T29159] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 158.483905][T29159] ? exit_to_user_mode_prepare+0x39/0xa0 [ 158.489375][T29159] do_syscall_64+0x3d/0xb0 [ 158.493626][T29159] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 158.499355][T29159] RIP: 0033:0x7f52511e2ae9 [ 158.503610][T29159] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 158.523049][T29159] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 158.531293][T29159] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 10:29:17 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 55) 10:29:17 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:17 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000001e80)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r2, 0x0, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7ff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x4000000) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001080)={&(0x7f0000001040)={0x1c, r2, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc000}, 0x4000844) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000000)={{0x0, 0x2e76, 0x28a2, 0x8, 0x7, 0x3, 0xd59, 0x8, 0x8, 0x8, 0x6ca, 0x5, 0x1, 0x100000001, 0x1}}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000003ec0)={{r3, 0x7, 0x4, 0x2, 0x40, 0x1000, 0x5, 0xffff, 0x4, 0x1, 0xa3, 0x22e, 0x6, 0x4, 0x9}}) process_vm_readv(r0, &(0x7f0000001800), 0x100000000000033b, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/75, 0x4d}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 10:29:17 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x100000, 0x180000}, 0x20) 10:29:17 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000000000)=""/120, 0x78}, {&(0x7f0000000080)=""/41, 0x29}, {&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/1, 0x1}, {&(0x7f0000001100)=""/148, 0x94}, {&(0x7f00000011c0)=""/244, 0xf4}, {&(0x7f00000012c0)=""/88, 0x58}, {&(0x7f0000001340)=""/36, 0x24}, {&(0x7f0000001380)=""/64, 0x40}], 0x9, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/259, 0x103}], 0x1, 0x0) 10:29:17 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) process_vm_readv(0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:17 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 158.539104][T29159] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 158.546917][T29159] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 158.554726][T29159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 158.562536][T29159] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 158.570351][T29159] 10:29:17 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:17 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) process_vm_readv(0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) [ 158.595567][ T30] audit: type=1400 audit(1691922557.089:130): avc: denied { ioctl } for pid=29174 comm="syz-executor.3" path="socket:[137304]" dev="sockfs" ino=137304 ioctlcmd=0x9411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 158.620987][T29183] FAULT_INJECTION: forcing a failure. [ 158.620987][T29183] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 158.642941][T29183] CPU: 0 PID: 29183 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 158.653095][T29183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 158.662991][T29183] Call Trace: [ 158.666110][T29183] [ 158.668891][T29183] dump_stack_lvl+0x151/0x1b7 [ 158.673399][T29183] ? io_uring_drop_tctx_refs+0x190/0x190 [ 158.678868][T29183] dump_stack+0x15/0x17 [ 158.682860][T29183] should_fail+0x3c6/0x510 [ 158.687124][T29183] should_fail_alloc_page+0x5a/0x80 [ 158.692159][T29183] prepare_alloc_pages+0x15c/0x700 [ 158.697097][T29183] ? __alloc_pages_bulk+0xf50/0xf50 [ 158.702129][T29183] ? __alloc_pages+0x5e0/0x5e0 [ 158.706730][T29183] __alloc_pages+0x138/0x5e0 [ 158.711160][T29183] ? zone_watermark_fast+0x220/0x220 [ 158.716276][T29183] ? __alloc_pages+0x206/0x5e0 [ 158.720877][T29183] ? zone_watermark_fast+0x220/0x220 [ 158.726170][T29183] ? __kasan_check_write+0x14/0x20 [ 158.731117][T29183] ? _raw_spin_lock+0xa4/0x1b0 [ 158.735720][T29183] pte_alloc_one+0x73/0x1b0 [ 158.740060][T29183] ? pfn_modify_allowed+0x2f0/0x2f0 [ 158.745349][T29183] ? __pmd_alloc+0x48d/0x550 [ 158.749779][T29183] __pte_alloc+0x86/0x350 [ 158.753947][T29183] ? __pud_alloc+0x260/0x260 [ 158.758368][T29183] ? __pud_alloc+0x213/0x260 [ 158.762798][T29183] ? free_pgtables+0x280/0x280 [ 158.767395][T29183] ? do_handle_mm_fault+0x2330/0x2330 [ 158.772606][T29183] ? __stack_depot_save+0x34/0x470 [ 158.777551][T29183] ? anon_vma_clone+0x9a/0x500 [ 158.782150][T29183] copy_page_range+0x28a8/0x2f90 [ 158.787100][T29183] ? __kasan_slab_alloc+0xb1/0xe0 [ 158.791960][T29183] ? slab_post_alloc_hook+0x53/0x2c0 [ 158.797261][T29183] ? copy_process+0x12bc/0x3260 [ 158.802033][T29183] ? __x64_sys_clone3+0x376/0x3a0 [ 158.806892][T29183] ? do_syscall_64+0x3d/0xb0 [ 158.811311][T29183] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 158.817227][T29183] ? pfn_valid+0x1e0/0x1e0 [ 158.821468][T29183] ? rwsem_write_trylock+0x15b/0x290 [ 158.826588][T29183] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 158.832931][T29183] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 158.838478][T29183] ? __rb_insert_augmented+0x5de/0x610 [ 158.843774][T29183] dup_mm+0xadc/0x12c0 [ 158.847683][T29183] ? copy_init_mm+0x20/0x20 [ 158.852117][T29183] copy_mm+0x107/0x1b0 [ 158.856015][T29183] copy_process+0x12bc/0x3260 [ 158.860556][T29183] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 158.865473][T29183] ? copy_clone_args_from_user+0x744/0x830 [ 158.871115][T29183] kernel_clone+0x21e/0x9e0 [ 158.875800][T29183] ? __delayed_free_task+0x20/0x20 [ 158.880746][T29183] ? vfs_write+0x9ec/0x1110 [ 158.885087][T29183] ? create_io_thread+0x1e0/0x1e0 [ 158.889952][T29183] __x64_sys_clone3+0x376/0x3a0 [ 158.894632][T29183] ? __ia32_sys_clone+0x290/0x290 [ 158.899840][T29183] ? fput+0x1a/0x20 [ 158.903489][T29183] ? debug_smp_processor_id+0x17/0x20 [ 158.908781][T29183] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 158.914687][T29183] ? exit_to_user_mode_prepare+0x39/0xa0 [ 158.920151][T29183] do_syscall_64+0x3d/0xb0 [ 158.924406][T29183] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 158.930132][T29183] RIP: 0033:0x7f52511e2ae9 [ 158.934389][T29183] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 158.953912][T29183] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 158.962162][T29183] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 158.969967][T29183] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 158.977786][T29183] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 158.985595][T29183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:29:17 executing program 0: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) process_vm_readv(0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:17 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000001e80)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r2, 0x0, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7ff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x4000000) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r2, 0x0, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7ff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x4000000) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001080)={&(0x7f0000001040)={0x1c, r2, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc000}, 0x4000844) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000000)={{0x0, 0x2e76, 0x28a2, 0x8, 0x7, 0x3, 0xd59, 0x8, 0x8, 0x8, 0x6ca, 0x5, 0x1, 0x100000001, 0x1}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000000)={{0x0, 0x2e76, 0x28a2, 0x8, 0x7, 0x3, 0xd59, 0x8, 0x8, 0x8, 0x6ca, 0x5, 0x1, 0x100000001, 0x1}}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000003ec0)={{r3, 0x7, 0x4, 0x2, 0x40, 0x1000, 0x5, 0xffff, 0x4, 0x1, 0xa3, 0x22e, 0x6, 0x4, 0x9}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000003ec0)={{r3, 0x7, 0x4, 0x2, 0x40, 0x1000, 0x5, 0xffff, 0x4, 0x1, 0xa3, 0x22e, 0x6, 0x4, 0x9}}) process_vm_readv(r0, &(0x7f0000001800), 0x100000000000033b, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/75, 0x4d}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 10:29:17 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:29:17 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 56) 10:29:17 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000000000)=""/120, 0x78}, {&(0x7f0000000080)=""/41, 0x29}, {&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/1, 0x1}, {&(0x7f0000001100)=""/148, 0x94}, {&(0x7f00000011c0)=""/244, 0xf4}, {&(0x7f00000012c0)=""/88, 0x58}, {&(0x7f0000001340)=""/36, 0x24}, {&(0x7f0000001380)=""/64, 0x40}], 0x9, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/259, 0x103}], 0x1, 0x0) 10:29:17 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:17 executing program 0: r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:17 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000001e80)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) socket$xdp(0x2c, 0x3, 0x0) (async) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r2, 0x0, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7ff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x4000000) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001080)={&(0x7f0000001040)={0x1c, r2, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc000}, 0x4000844) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000000)={{0x0, 0x2e76, 0x28a2, 0x8, 0x7, 0x3, 0xd59, 0x8, 0x8, 0x8, 0x6ca, 0x5, 0x1, 0x100000001, 0x1}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000000)={{0x0, 0x2e76, 0x28a2, 0x8, 0x7, 0x3, 0xd59, 0x8, 0x8, 0x8, 0x6ca, 0x5, 0x1, 0x100000001, 0x1}}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000003ec0)={{r3, 0x7, 0x4, 0x2, 0x40, 0x1000, 0x5, 0xffff, 0x4, 0x1, 0xa3, 0x22e, 0x6, 0x4, 0x9}}) process_vm_readv(r0, &(0x7f0000001800), 0x100000000000033b, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/75, 0x4d}, {0x0}], 0x2, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) (async) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 10:29:17 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:29:17 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000000000)=""/120, 0x78}, {&(0x7f0000000080)=""/41, 0x29}, {&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/1, 0x1}, {&(0x7f0000001100)=""/148, 0x94}, {&(0x7f00000011c0)=""/244, 0xf4}, {&(0x7f00000012c0)=""/88, 0x58}, {&(0x7f0000001340)=""/36, 0x24}, {&(0x7f0000001380)=""/64, 0x40}], 0x9, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/259, 0x103}], 0x1, 0x0) (async) process_vm_readv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000000000)=""/120, 0x78}, {&(0x7f0000000080)=""/41, 0x29}, {&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/1, 0x1}, {&(0x7f0000001100)=""/148, 0x94}, {&(0x7f00000011c0)=""/244, 0xf4}, {&(0x7f00000012c0)=""/88, 0x58}, {&(0x7f0000001340)=""/36, 0x24}, {&(0x7f0000001380)=""/64, 0x40}], 0x9, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/259, 0x103}], 0x1, 0x0) 10:29:17 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) [ 158.993414][T29183] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 159.001406][T29183] 10:29:17 executing program 0: r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:17 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{0x0}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:17 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x100000, 0x180000}, 0x20) 10:29:17 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid\x00') [ 159.061371][T29209] FAULT_INJECTION: forcing a failure. [ 159.061371][T29209] name failslab, interval 1, probability 0, space 0, times 0 [ 159.100920][T29209] CPU: 0 PID: 29209 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 159.111082][T29209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 159.120970][T29209] Call Trace: [ 159.124092][T29209] [ 159.126870][T29209] dump_stack_lvl+0x151/0x1b7 [ 159.131381][T29209] ? io_uring_drop_tctx_refs+0x190/0x190 [ 159.136850][T29209] dump_stack+0x15/0x17 [ 159.140840][T29209] should_fail+0x3c6/0x510 [ 159.145107][T29209] __should_failslab+0xa4/0xe0 [ 159.149694][T29209] ? vm_area_dup+0x26/0x230 [ 159.154034][T29209] should_failslab+0x9/0x20 [ 159.158375][T29209] slab_pre_alloc_hook+0x37/0xd0 [ 159.163146][T29209] ? vm_area_dup+0x26/0x230 [ 159.167573][T29209] kmem_cache_alloc+0x44/0x200 [ 159.172172][T29209] vm_area_dup+0x26/0x230 [ 159.176340][T29209] dup_mm+0x81b/0x12c0 [ 159.180253][T29209] ? copy_init_mm+0x20/0x20 [ 159.184587][T29209] copy_mm+0x107/0x1b0 [ 159.188491][T29209] copy_process+0x12bc/0x3260 [ 159.193006][T29209] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 159.197953][T29209] ? copy_clone_args_from_user+0x744/0x830 [ 159.203592][T29209] kernel_clone+0x21e/0x9e0 [ 159.207933][T29209] ? __delayed_free_task+0x20/0x20 [ 159.212880][T29209] ? vfs_write+0x9ec/0x1110 [ 159.218954][T29209] ? create_io_thread+0x1e0/0x1e0 [ 159.223817][T29209] __x64_sys_clone3+0x376/0x3a0 [ 159.228590][T29209] ? __ia32_sys_clone+0x290/0x290 [ 159.233451][T29209] ? fput+0x1a/0x20 [ 159.237093][T29209] ? debug_smp_processor_id+0x17/0x20 [ 159.242299][T29209] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 159.248211][T29209] ? exit_to_user_mode_prepare+0x39/0xa0 [ 159.254278][T29209] do_syscall_64+0x3d/0xb0 [ 159.258534][T29209] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 159.264263][T29209] RIP: 0033:0x7f52511e2ae9 [ 159.268513][T29209] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 159.288040][T29209] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 159.296288][T29209] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 159.304103][T29209] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 10:29:17 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 57) 10:29:17 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x100000, 0x180000}, 0x20) 10:29:17 executing program 5: sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:17 executing program 0: r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:17 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:29:17 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid\x00') 10:29:17 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid\x00') 10:29:17 executing program 5: sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x0) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:17 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) [ 159.311910][T29209] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 159.319717][T29209] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 159.327531][T29209] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 159.335348][T29209] 10:29:17 executing program 5: sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x0) (async) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:17 executing program 3: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/73, 0x49}, {0x0}], 0x2, 0x0) 10:29:17 executing program 3: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/73, 0x49}, {0x0}], 0x2, 0x0) [ 159.376291][T29238] FAULT_INJECTION: forcing a failure. [ 159.376291][T29238] name failslab, interval 1, probability 0, space 0, times 0 [ 159.391703][T29238] CPU: 0 PID: 29238 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 159.401856][T29238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 159.411749][T29238] Call Trace: [ 159.414873][T29238] [ 159.417650][T29238] dump_stack_lvl+0x151/0x1b7 [ 159.422166][T29238] ? io_uring_drop_tctx_refs+0x190/0x190 [ 159.427633][T29238] dump_stack+0x15/0x17 [ 159.431624][T29238] should_fail+0x3c6/0x510 [ 159.435878][T29238] __should_failslab+0xa4/0xe0 [ 159.440471][T29238] ? vm_area_dup+0x26/0x230 [ 159.444812][T29238] should_failslab+0x9/0x20 [ 159.449158][T29238] slab_pre_alloc_hook+0x37/0xd0 [ 159.453923][T29238] ? vm_area_dup+0x26/0x230 [ 159.458274][T29238] kmem_cache_alloc+0x44/0x200 [ 159.462868][T29238] vm_area_dup+0x26/0x230 [ 159.467029][T29238] dup_mm+0x81b/0x12c0 [ 159.470937][T29238] ? copy_init_mm+0x20/0x20 [ 159.475275][T29238] copy_mm+0x107/0x1b0 [ 159.479266][T29238] copy_process+0x12bc/0x3260 [ 159.484045][T29238] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 159.488991][T29238] ? copy_clone_args_from_user+0x744/0x830 [ 159.494630][T29238] kernel_clone+0x21e/0x9e0 [ 159.498971][T29238] ? __delayed_free_task+0x20/0x20 [ 159.503916][T29238] ? vfs_write+0x9ec/0x1110 [ 159.508265][T29238] ? create_io_thread+0x1e0/0x1e0 [ 159.513117][T29238] __x64_sys_clone3+0x376/0x3a0 [ 159.517892][T29238] ? __ia32_sys_clone+0x290/0x290 [ 159.522750][T29238] ? fput+0x1a/0x20 [ 159.526397][T29238] ? debug_smp_processor_id+0x17/0x20 [ 159.531602][T29238] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 159.537525][T29238] ? exit_to_user_mode_prepare+0x39/0xa0 [ 159.542976][T29238] do_syscall_64+0x3d/0xb0 [ 159.547315][T29238] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 159.553042][T29238] RIP: 0033:0x7f52511e2ae9 [ 159.557306][T29238] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 10:29:18 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 58) 10:29:18 executing program 3: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/73, 0x49}, {0x0}], 0x2, 0x0) 10:29:18 executing program 5: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001080)={'wpan3\x00'}) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, r1, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x81}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x6}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xba}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x4c001}, 0x4c001) pipe(&(0x7f0000000100)) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:18 executing program 0: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:18 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x100000, 0x180000}, 0x20) 10:29:18 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) 10:29:18 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, 0x0, 0x0, 0x0) [ 159.576734][T29238] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 159.584982][T29238] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 159.592793][T29238] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 159.600605][T29238] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 159.608432][T29238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 159.616225][T29238] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 159.624037][T29238] 10:29:18 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x180000}, 0x20) 10:29:18 executing program 0: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:18 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x243fc4bb44ba9976, 0x8, 0x9, 0x2, {{0x29, 0x4, 0x2, 0x4, 0xa4, 0x68, 0x0, 0x8, 0x29, 0x0, @remote, @empty, {[@timestamp_prespec={0x44, 0xc, 0x84, 0x3, 0x4, [{@multicast2, 0x5}]}, @cipso={0x86, 0x15, 0xffffffffffffffff, [{0x2, 0xa, "de8417ad65900627"}, {0x5, 0x5, "63b927"}]}, @timestamp_prespec={0x44, 0x14, 0x35, 0x3, 0x2, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfffff6de}, {@remote, 0x4}]}, @ssrr={0x89, 0xb, 0xc0, [@multicast1, @broadcast]}, @noop, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x27, 0xdf, [@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @multicast2, @local, @multicast2, @multicast2, @broadcast, @multicast2, @rand_addr=0x64010101]}, @ssrr={0x89, 0x17, 0xc9, [@local, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @multicast2]}, @timestamp_prespec={0x44, 0xc, 0x35, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x78a}]}]}}}}}) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, r0, 0x404, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x400}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6e}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1830}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000080)=0x720) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000340)={0xffffffffffffffff, r1, 0x25, 0xa}, 0x10) 10:29:18 executing program 5: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) (async) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001080)={'wpan3\x00'}) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, r1, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x81}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x6}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xba}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x4c001}, 0x4c001) pipe(&(0x7f0000000100)) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:18 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) (async) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x243fc4bb44ba9976, 0x8, 0x9, 0x2, {{0x29, 0x4, 0x2, 0x4, 0xa4, 0x68, 0x0, 0x8, 0x29, 0x0, @remote, @empty, {[@timestamp_prespec={0x44, 0xc, 0x84, 0x3, 0x4, [{@multicast2, 0x5}]}, @cipso={0x86, 0x15, 0xffffffffffffffff, [{0x2, 0xa, "de8417ad65900627"}, {0x5, 0x5, "63b927"}]}, @timestamp_prespec={0x44, 0x14, 0x35, 0x3, 0x2, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfffff6de}, {@remote, 0x4}]}, @ssrr={0x89, 0xb, 0xc0, [@multicast1, @broadcast]}, @noop, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x27, 0xdf, [@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @multicast2, @local, @multicast2, @multicast2, @broadcast, @multicast2, @rand_addr=0x64010101]}, @ssrr={0x89, 0x17, 0xc9, [@local, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @multicast2]}, @timestamp_prespec={0x44, 0xc, 0x35, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x78a}]}]}}}}}) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, r0, 0x404, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x400}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6e}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1830}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) (async) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000080)=0x720) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000340)={0xffffffffffffffff, r1, 0x25, 0xa}, 0x10) [ 159.673286][ T30] audit: type=1400 audit(1691922558.169:131): avc: denied { append } for pid=29265 comm="syz-executor.3" name="random" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 159.685897][T29273] FAULT_INJECTION: forcing a failure. [ 159.685897][T29273] name failslab, interval 1, probability 0, space 0, times 0 [ 159.726964][T29273] CPU: 0 PID: 29273 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 159.737305][T29273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 159.747284][T29273] Call Trace: [ 159.750400][T29273] [ 159.753191][T29273] dump_stack_lvl+0x151/0x1b7 [ 159.757691][T29273] ? io_uring_drop_tctx_refs+0x190/0x190 [ 159.763161][T29273] dump_stack+0x15/0x17 [ 159.767153][T29273] should_fail+0x3c6/0x510 [ 159.771404][T29273] __should_failslab+0xa4/0xe0 [ 159.776003][T29273] ? vm_area_dup+0x26/0x230 [ 159.780343][T29273] should_failslab+0x9/0x20 [ 159.784682][T29273] slab_pre_alloc_hook+0x37/0xd0 [ 159.789456][T29273] ? vm_area_dup+0x26/0x230 [ 159.793793][T29273] kmem_cache_alloc+0x44/0x200 [ 159.798396][T29273] vm_area_dup+0x26/0x230 [ 159.802560][T29273] dup_mm+0x81b/0x12c0 [ 159.806466][T29273] ? copy_init_mm+0x20/0x20 [ 159.810806][T29273] copy_mm+0x107/0x1b0 [ 159.814724][T29273] copy_process+0x12bc/0x3260 [ 159.819226][T29273] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 159.824333][T29273] ? copy_clone_args_from_user+0x744/0x830 [ 159.829958][T29273] kernel_clone+0x21e/0x9e0 [ 159.834295][T29273] ? __delayed_free_task+0x20/0x20 [ 159.839243][T29273] ? vfs_write+0x9ec/0x1110 [ 159.843591][T29273] ? create_io_thread+0x1e0/0x1e0 [ 159.848450][T29273] __x64_sys_clone3+0x376/0x3a0 [ 159.853216][T29273] ? __ia32_sys_clone+0x290/0x290 [ 159.858075][T29273] ? fput+0x1a/0x20 [ 159.861735][T29273] ? debug_smp_processor_id+0x17/0x20 [ 159.866927][T29273] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 159.872830][T29273] ? exit_to_user_mode_prepare+0x39/0xa0 [ 159.878297][T29273] do_syscall_64+0x3d/0xb0 [ 159.882552][T29273] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 159.888278][T29273] RIP: 0033:0x7f52511e2ae9 [ 159.892534][T29273] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 159.912081][T29273] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 10:29:18 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 59) 10:29:18 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}], 0x1, 0x0) 10:29:18 executing program 5: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001080)={'wpan3\x00'}) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, r1, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x81}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x6}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xba}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x4c001}, 0x4c001) pipe(&(0x7f0000000100)) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:18 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x243fc4bb44ba9976, 0x8, 0x9, 0x2, {{0x29, 0x4, 0x2, 0x4, 0xa4, 0x68, 0x0, 0x8, 0x29, 0x0, @remote, @empty, {[@timestamp_prespec={0x44, 0xc, 0x84, 0x3, 0x4, [{@multicast2, 0x5}]}, @cipso={0x86, 0x15, 0xffffffffffffffff, [{0x2, 0xa, "de8417ad65900627"}, {0x5, 0x5, "63b927"}]}, @timestamp_prespec={0x44, 0x14, 0x35, 0x3, 0x2, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfffff6de}, {@remote, 0x4}]}, @ssrr={0x89, 0xb, 0xc0, [@multicast1, @broadcast]}, @noop, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x27, 0xdf, [@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @multicast2, @local, @multicast2, @multicast2, @broadcast, @multicast2, @rand_addr=0x64010101]}, @ssrr={0x89, 0x17, 0xc9, [@local, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @multicast2]}, @timestamp_prespec={0x44, 0xc, 0x35, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x78a}]}]}}}}}) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, r0, 0x404, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x400}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6e}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1830}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) (async) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000080)=0x720) (async) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000340)={0xffffffffffffffff, r1, 0x25, 0xa}, 0x10) 10:29:18 executing program 0: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:18 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0xa}, 0x20) 10:29:18 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x410, 0x70bd26, 0x25dfdbff, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x40}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0x100}}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x3}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x3f}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20084814}, 0x20000000) 10:29:18 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0xa}, 0x20) 10:29:18 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}], 0x1, 0x0) [ 159.920328][T29273] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 159.928145][T29273] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 159.935947][T29273] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 159.943855][T29273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 159.951657][T29273] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 159.959470][T29273] 10:29:18 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$fou(&(0x7f00000003c0), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYRESHEX=r1, @ANYRES16=r0, @ANYBLOB="000229bd7000fbdbdf2501000000050004000200000006000a004e20000008000800e00000010800060000000000060001004e21000004000500060001004e24000008000b00", @ANYRES32=0x0, @ANYBLOB], 0x58}, 0x1, 0x0, 0x0, 0x400c08c}, 0x4000) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) syz_genetlink_get_family_id$gtp(&(0x7f0000000400), r2) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x43a) process_vm_readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000000)=""/32, 0x20}, {&(0x7f0000000040)=""/213, 0xd5}, {&(0x7f0000000140)=""/48, 0x30}], 0x3, &(0x7f0000000340)=[{&(0x7f00000001c0)=""/125, 0x7d}, {&(0x7f0000000240)=""/87, 0x57}, {&(0x7f00000002c0)=""/95, 0x5f}], 0x3, 0x0) 10:29:18 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:18 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0xa}, 0x20) [ 160.010743][T29296] FAULT_INJECTION: forcing a failure. [ 160.010743][T29296] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 160.052939][T29296] CPU: 1 PID: 29296 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 160.063195][T29296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 160.073087][T29296] Call Trace: [ 160.076221][T29296] [ 160.079164][T29296] dump_stack_lvl+0x151/0x1b7 [ 160.083673][T29296] ? io_uring_drop_tctx_refs+0x190/0x190 [ 160.089151][T29296] dump_stack+0x15/0x17 [ 160.093213][T29296] should_fail+0x3c6/0x510 [ 160.097467][T29296] should_fail_alloc_page+0x5a/0x80 [ 160.102497][T29296] prepare_alloc_pages+0x15c/0x700 [ 160.108920][T29296] ? __alloc_pages_bulk+0xf50/0xf50 [ 160.114974][T29296] __alloc_pages+0x138/0x5e0 [ 160.119395][T29296] ? zone_watermark_fast+0x220/0x220 [ 160.124521][T29296] ? is_bpf_text_address+0x172/0x190 [ 160.130767][T29296] pte_alloc_one+0x73/0x1b0 [ 160.135101][T29296] ? pfn_modify_allowed+0x2f0/0x2f0 [ 160.140171][T29296] ? arch_stack_walk+0xf3/0x140 [ 160.144823][T29296] __pte_alloc+0x86/0x350 [ 160.148989][T29296] ? free_pgtables+0x280/0x280 [ 160.153586][T29296] ? _raw_spin_lock+0xa4/0x1b0 [ 160.158277][T29296] ? __kasan_check_write+0x14/0x20 [ 160.163222][T29296] copy_page_range+0x28a8/0x2f90 [ 160.167996][T29296] ? __kasan_slab_alloc+0xb1/0xe0 [ 160.172873][T29296] ? pfn_valid+0x1e0/0x1e0 [ 160.177122][T29296] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 160.182664][T29296] ? __rb_insert_augmented+0x5de/0x610 [ 160.187958][T29296] dup_mm+0xadc/0x12c0 [ 160.191863][T29296] ? copy_init_mm+0x20/0x20 [ 160.196202][T29296] copy_mm+0x107/0x1b0 [ 160.200113][T29296] copy_process+0x12bc/0x3260 [ 160.204624][T29296] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 160.209572][T29296] ? copy_clone_args_from_user+0x744/0x830 [ 160.215213][T29296] kernel_clone+0x21e/0x9e0 [ 160.219635][T29296] ? __delayed_free_task+0x20/0x20 [ 160.224581][T29296] ? vfs_write+0x9ec/0x1110 [ 160.228929][T29296] ? create_io_thread+0x1e0/0x1e0 [ 160.233782][T29296] __x64_sys_clone3+0x376/0x3a0 [ 160.238470][T29296] ? __ia32_sys_clone+0x290/0x290 [ 160.243417][T29296] ? fput+0x1a/0x20 [ 160.247089][T29296] ? debug_smp_processor_id+0x17/0x20 [ 160.252272][T29296] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 160.258181][T29296] ? exit_to_user_mode_prepare+0x39/0xa0 [ 160.263649][T29296] do_syscall_64+0x3d/0xb0 [ 160.267991][T29296] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 160.273706][T29296] RIP: 0033:0x7f52511e2ae9 [ 160.277961][T29296] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 10:29:18 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 60) 10:29:18 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x410, 0x70bd26, 0x25dfdbff, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x40}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0x100}}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x3}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x3f}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20084814}, 0x20000000) 10:29:18 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}], 0x1, 0x0) 10:29:18 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40), 0x0, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:18 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = syz_genetlink_get_family_id$fou(&(0x7f00000003c0), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYRESHEX=r1, @ANYRES16=r0, @ANYBLOB="000229bd7000fbdbdf2501000000050004000200000006000a004e20000008000800e00000010800060000000000060001004e21000004000500060001004e24000008000b00", @ANYRES32=0x0, @ANYBLOB], 0x58}, 0x1, 0x0, 0x0, 0x400c08c}, 0x4000) (async) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) (async) syz_genetlink_get_family_id$gtp(&(0x7f0000000400), r2) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x43a) process_vm_readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000000)=""/32, 0x20}, {&(0x7f0000000040)=""/213, 0xd5}, {&(0x7f0000000140)=""/48, 0x30}], 0x3, &(0x7f0000000340)=[{&(0x7f00000001c0)=""/125, 0x7d}, {&(0x7f0000000240)=""/87, 0x57}, {&(0x7f00000002c0)=""/95, 0x5f}], 0x3, 0x0) 10:29:18 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x243fc4bb44ba9976, 0x8, 0x9, 0x2, {{0x29, 0x4, 0x2, 0x4, 0xa4, 0x68, 0x0, 0x8, 0x29, 0x0, @remote, @empty, {[@timestamp_prespec={0x44, 0xc, 0x84, 0x3, 0x4, [{@multicast2, 0x5}]}, @cipso={0x86, 0x15, 0xffffffffffffffff, [{0x2, 0xa, "de8417ad65900627"}, {0x5, 0x5, "63b927"}]}, @timestamp_prespec={0x44, 0x14, 0x35, 0x3, 0x2, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfffff6de}, {@remote, 0x4}]}, @ssrr={0x89, 0xb, 0xc0, [@multicast1, @broadcast]}, @noop, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x27, 0xdf, [@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @multicast2, @local, @multicast2, @multicast2, @broadcast, @multicast2, @rand_addr=0x64010101]}, @ssrr={0x89, 0x17, 0xc9, [@local, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @multicast2]}, @timestamp_prespec={0x44, 0xc, 0x35, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x78a}]}]}}}}}) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, r0, 0x404, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x400}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6e}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1830}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000080)=0x720) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000340)={0xffffffffffffffff, r1, 0x25, 0xa}, 0x10) 10:29:18 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40), 0x0, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) [ 160.297663][T29296] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 160.305907][T29296] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 160.313719][T29296] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 160.321529][T29296] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 160.329342][T29296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 160.337152][T29296] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 160.344963][T29296] 10:29:18 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:29:18 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x410, 0x70bd26, 0x25dfdbff, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x40}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0x100}}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x3}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x3f}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20084814}, 0x20000000) 10:29:18 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$fou(&(0x7f00000003c0), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYRESHEX=r1, @ANYRES16=r0, @ANYBLOB="000229bd7000fbdbdf2501000000050004000200000006000a004e20000008000800e00000010800060000000000060001004e21000004000500060001004e24000008000b00", @ANYRES32=0x0, @ANYBLOB], 0x58}, 0x1, 0x0, 0x0, 0x400c08c}, 0x4000) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) syz_genetlink_get_family_id$gtp(&(0x7f0000000400), r2) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x43a) process_vm_readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000000)=""/32, 0x20}, {&(0x7f0000000040)=""/213, 0xd5}, {&(0x7f0000000140)=""/48, 0x30}], 0x3, &(0x7f0000000340)=[{&(0x7f00000001c0)=""/125, 0x7d}, {&(0x7f0000000240)=""/87, 0x57}, {&(0x7f00000002c0)=""/95, 0x5f}], 0x3, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_genetlink_get_family_id$fou(&(0x7f00000003c0), 0xffffffffffffffff) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYRESHEX=r1, @ANYRES16=r0, @ANYBLOB="000229bd7000fbdbdf2501000000050004000200000006000a004e20000008000800e00000010800060000000000060001004e21000004000500060001004e24000008000b00", @ANYRES32=0x0, @ANYBLOB], 0x58}, 0x1, 0x0, 0x0, 0x400c08c}, 0x4000) (async) open(0x0, 0x680002, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) (async) syz_genetlink_get_family_id$gtp(&(0x7f0000000400), r2) (async) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x43a) (async) process_vm_readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000000)=""/32, 0x20}, {&(0x7f0000000040)=""/213, 0xd5}, {&(0x7f0000000140)=""/48, 0x30}], 0x3, &(0x7f0000000340)=[{&(0x7f00000001c0)=""/125, 0x7d}, {&(0x7f0000000240)=""/87, 0x57}, {&(0x7f00000002c0)=""/95, 0x5f}], 0x3, 0x0) (async) [ 160.372837][T29309] FAULT_INJECTION: forcing a failure. [ 160.372837][T29309] name failslab, interval 1, probability 0, space 0, times 0 [ 160.393651][T29309] CPU: 1 PID: 29309 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 160.403827][T29309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 160.413712][T29309] Call Trace: [ 160.416879][T29309] 10:29:18 executing program 5: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x3a4, 0xdf}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r1, 0x2f, 0xff, 0xff, 0x0, 0x4, @loopback, @loopback, 0x799, 0x8, 0x2, 0x34}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'gretap0\x00', &(0x7f00000001c0)={'sit0\x00', r1, 0x40, 0x1, 0xf56, 0x5, {{0x1a, 0x4, 0x3, 0x6, 0x68, 0x64, 0x0, 0xd, 0x29, 0x0, @broadcast, @rand_addr=0x64010100, {[@lsrr={0x83, 0x27, 0x7b, [@local, @private=0xa010100, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @empty, @empty, @multicast2]}, @generic={0x89, 0xf, "969c846b8f2c0929c06433317e"}, @noop, @noop, @timestamp_prespec={0x44, 0x1c, 0xca, 0x3, 0x2, [{@multicast2}, {@remote}, {@broadcast}]}]}}}}}) socketpair(0x21, 0x1, 0x6, &(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r7, 0x89f8, &(0x7f0000000e40)={'ip_vti0\x00', &(0x7f0000000d80)={'syztnl0\x00', r5, 0x700, 0x20, 0x7, 0xfffffff9, {{0x1f, 0x4, 0x2, 0x21, 0x7c, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast2, {[@cipso={0x86, 0x4c, 0xffffffffffffffff, [{0x1, 0xe, "7bbebef2017d91e7a74b5f13"}, {0x1, 0x10, "6a6c44ace2aae544ef1b8734b10f"}, {0x5, 0x7, "52450f209d"}, {0x0, 0x7, "76fd9cc979"}, {0x0, 0xa, "a7412dc8560adb9c"}, {0x0, 0xc, "65c909191937a9910249"}, {0x2, 0x4, "b4b4"}]}, @timestamp_prespec={0x44, 0x1c, 0x9, 0x3, 0x0, [{@loopback, 0x9}, {@local, 0x32b}, {@local, 0x3}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000340)={'tunl0\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB='gretap0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="00078000001e008000a4370c3751b551218b9a861a48006700001c049031b58b567978ac1414aaffffffff94040100862d000000400203a7010806e870077bcf000306b00000f1500544fb177794525cdc103346c2671768259389f61e59010a728a8fe0170953fd00000000000000"]}) openat$cgroup_int(r0, &(0x7f0000000d00)='cpu.max\x00', 0x2, 0x0) r9 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r9, 0x81f8943c, &(0x7f0000000540)) ioctl$sock_inet6_SIOCDELRT(r9, 0x890c, &(0x7f00000002c0)={@dev={0xfe, 0x80, '\x00', 0x3e}, @private2, @private2={0xfc, 0x2, '\x00', 0x1}, 0xaef1, 0x4, 0x3, 0x100, 0x40, 0x200}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000380)={'vxcan0\x00', 0x0}) r11 = getpid() syz_open_procfs$userns(r11, 0x0) syz_open_procfs$userns(r11, &(0x7f0000000cc0)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'tunl0\x00', &(0x7f00000003c0)={'ip_vti0\x00', r1, 0x80, 0x50, 0x7ff, 0x81, {{0x13, 0x4, 0x3, 0x39, 0x4c, 0x65, 0x0, 0xcf, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x2e}, @multicast1, {[@timestamp_prespec={0x44, 0x2c, 0x81, 0x3, 0x8, [{@remote, 0x7}, {@dev={0xac, 0x14, 0x14, 0x2e}, 0x837}, {@empty, 0x10000}, {@loopback, 0x401}, {@private=0xa010101, 0x7}]}, @generic={0x86, 0xa, "858a5b0098723964"}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'tunl0\x00', &(0x7f00000004c0)={'syztnl0\x00', r1, 0x80, 0x8000, 0xfffff158, 0x7, {{0xe, 0x4, 0x3, 0x1, 0x38, 0x67, 0x0, 0x9, 0x4a3a065265b55828, 0x0, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@ssrr={0x89, 0x23, 0xa5, [@multicast2, @dev={0xac, 0x14, 0x14, 0x13}, @multicast2, @empty, @rand_addr=0x64010102, @rand_addr=0x64010101, @multicast2, @remote]}]}}}}}) socket$pptp(0x18, 0x1, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000740)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000780)={'vxcan1\x00', 0x0}) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000007c0)={r16, 0x1, 0x6, @broadcast}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b80)={&(0x7f0000001480)={0x5e4, 0x0, 0x406, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r1}, {0x130, 0x2, 0x0, 0x1, [{0x3c, 0x1, @bpf_hash_func={{0x24}, {0x1a}, {0xc, 0x4, [{0x200, 0x0, 0x9, 0x100}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xcc}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff001}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r8}, {0xfc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r10}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r12}, {0x224, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x7c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4c, 0x4, [{0x9, 0x80, 0x40, 0x80}, {0x3fd, 0x9, 0x1, 0x9}, {0x9, 0x40, 0x20, 0x6}, {0x40, 0x40, 0x80, 0x8}, {0x8, 0x40, 0x6, 0x3}, {0x3, 0x81, 0x20, 0x3}, {0x3ff, 0xfd, 0x20, 0x8}, {0x7f, 0x2, 0x2, 0x2}, {0xb6, 0x9, 0xc0, 0x3}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xc6}}}]}}, {{0x8, 0x1, r13}, {0x88, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xb11}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xc54, 0xff, 0x20, 0x9}, {0x7, 0x8, 0x80, 0x9}, {0x34, 0x40, 0x4, 0x9}]}}}, {0x0, 0x1, @lb_port_stats={{{}, {}, {0x0, 0x4, 0x3f}}, {0x0, 0x6, r15}}}]}}, {{0x8, 0x1, r14}, {0x88, 0x2, 0x0, 0x1, [{0xdc, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x5e4}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) [ 160.419606][T29309] dump_stack_lvl+0x151/0x1b7 [ 160.424124][T29309] ? io_uring_drop_tctx_refs+0x190/0x190 [ 160.429592][T29309] ? avc_denied+0x1b0/0x1b0 [ 160.433945][T29309] dump_stack+0x15/0x17 [ 160.437918][T29309] should_fail+0x3c6/0x510 [ 160.442176][T29309] __should_failslab+0xa4/0xe0 [ 160.446768][T29309] ? vm_area_dup+0x26/0x230 [ 160.451108][T29309] should_failslab+0x9/0x20 [ 160.455447][T29309] slab_pre_alloc_hook+0x37/0xd0 [ 160.460231][T29309] ? vm_area_dup+0x26/0x230 [ 160.464558][T29309] kmem_cache_alloc+0x44/0x200 [ 160.469163][T29309] vm_area_dup+0x26/0x230 [ 160.473328][T29309] dup_mm+0x81b/0x12c0 [ 160.477232][T29309] ? copy_init_mm+0x20/0x20 [ 160.481574][T29309] copy_mm+0x107/0x1b0 [ 160.485482][T29309] copy_process+0x12bc/0x3260 [ 160.489994][T29309] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 160.494972][T29309] ? copy_clone_args_from_user+0x744/0x830 [ 160.500579][T29309] kernel_clone+0x21e/0x9e0 [ 160.504919][T29309] ? __delayed_free_task+0x20/0x20 [ 160.509872][T29309] ? vfs_write+0x9ec/0x1110 [ 160.514219][T29309] ? create_io_thread+0x1e0/0x1e0 [ 160.519106][T29309] __x64_sys_clone3+0x376/0x3a0 [ 160.523755][T29309] ? __ia32_sys_clone+0x290/0x290 [ 160.528616][T29309] ? fput+0x1a/0x20 [ 160.532260][T29309] ? debug_smp_processor_id+0x17/0x20 [ 160.537555][T29309] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 160.543458][T29309] ? exit_to_user_mode_prepare+0x39/0xa0 [ 160.548925][T29309] do_syscall_64+0x3d/0xb0 [ 160.553174][T29309] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 160.558903][T29309] RIP: 0033:0x7f52511e2ae9 [ 160.563159][T29309] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 160.582612][T29309] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 160.590844][T29309] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 160.598656][T29309] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 160.606473][T29309] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 160.614278][T29309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:29:19 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x243fc4bb44ba9976, 0x8, 0x9, 0x2, {{0x29, 0x4, 0x2, 0x4, 0xa4, 0x68, 0x0, 0x8, 0x29, 0x0, @remote, @empty, {[@timestamp_prespec={0x44, 0xc, 0x84, 0x3, 0x4, [{@multicast2, 0x5}]}, @cipso={0x86, 0x15, 0xffffffffffffffff, [{0x2, 0xa, "de8417ad65900627"}, {0x5, 0x5, "63b927"}]}, @timestamp_prespec={0x44, 0x14, 0x35, 0x3, 0x2, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfffff6de}, {@remote, 0x4}]}, @ssrr={0x89, 0xb, 0xc0, [@multicast1, @broadcast]}, @noop, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x27, 0xdf, [@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @multicast2, @local, @multicast2, @multicast2, @broadcast, @multicast2, @rand_addr=0x64010101]}, @ssrr={0x89, 0x17, 0xc9, [@local, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @multicast2]}, @timestamp_prespec={0x44, 0xc, 0x35, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x78a}]}]}}}}}) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, r0, 0x404, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x400}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6e}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1830}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000080)=0x720) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000340)={0xffffffffffffffff, r1, 0x25, 0xa}, 0x10) 10:29:19 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 61) 10:29:19 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:29:19 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40), 0x0, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:19 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gretap0\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x8, 0x1, 0x8, 0x7, {{0x1d, 0x4, 0x1, 0x0, 0x74, 0x66, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, {[@timestamp_addr={0x44, 0x2c, 0x7b, 0x1, 0x1, [{@dev={0xac, 0x14, 0x14, 0x17}, 0x6}, {@remote}, {@multicast2, 0x1}, {@empty, 0x6}, {@local, 0xff}]}, @ssrr={0x89, 0x27, 0x72, [@loopback, @private=0xa010100, @empty, @private=0xa010101, @remote, @multicast2, @empty, @loopback, @rand_addr=0x64010101]}, @timestamp={0x44, 0xc, 0x9d, 0x0, 0xf, [0x8001, 0x9]}]}}}}}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="04002bbd7000fedbdf250100000008003a0004000000050029000100000008003100800000000a000900aaaaaaaaaabb000008000600", @ANYRES32=r0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004810) ptrace$peeksig(0x4209, 0x0, &(0x7f0000000000)={0x3, 0x0, 0x1}, &(0x7f0000000040)=[{}]) 10:29:19 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x243fc4bb44ba9976, 0x8, 0x9, 0x2, {{0x29, 0x4, 0x2, 0x4, 0xa4, 0x68, 0x0, 0x8, 0x29, 0x0, @remote, @empty, {[@timestamp_prespec={0x44, 0xc, 0x84, 0x3, 0x4, [{@multicast2, 0x5}]}, @cipso={0x86, 0x15, 0xffffffffffffffff, [{0x2, 0xa, "de8417ad65900627"}, {0x5, 0x5, "63b927"}]}, @timestamp_prespec={0x44, 0x14, 0x35, 0x3, 0x2, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfffff6de}, {@remote, 0x4}]}, @ssrr={0x89, 0xb, 0xc0, [@multicast1, @broadcast]}, @noop, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x27, 0xdf, [@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @multicast2, @local, @multicast2, @multicast2, @broadcast, @multicast2, @rand_addr=0x64010101]}, @ssrr={0x89, 0x17, 0xc9, [@local, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @multicast2]}, @timestamp_prespec={0x44, 0xc, 0x35, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x78a}]}]}}}}}) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, r0, 0x404, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x400}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6e}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1830}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000080)=0x720) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000340)={0xffffffffffffffff, r1, 0x25, 0xa}, 0x10) 10:29:19 executing program 5: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x3a4, 0xdf}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) (async) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) (async, rerun: 64) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r1, 0x2f, 0xff, 0xff, 0x0, 0x4, @loopback, @loopback, 0x799, 0x8, 0x2, 0x34}}) (async, rerun: 64) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'gretap0\x00', &(0x7f00000001c0)={'sit0\x00', r1, 0x40, 0x1, 0xf56, 0x5, {{0x1a, 0x4, 0x3, 0x6, 0x68, 0x64, 0x0, 0xd, 0x29, 0x0, @broadcast, @rand_addr=0x64010100, {[@lsrr={0x83, 0x27, 0x7b, [@local, @private=0xa010100, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @empty, @empty, @multicast2]}, @generic={0x89, 0xf, "969c846b8f2c0929c06433317e"}, @noop, @noop, @timestamp_prespec={0x44, 0x1c, 0xca, 0x3, 0x2, [{@multicast2}, {@remote}, {@broadcast}]}]}}}}}) (async) socketpair(0x21, 0x1, 0x6, &(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r7, 0x89f8, &(0x7f0000000e40)={'ip_vti0\x00', &(0x7f0000000d80)={'syztnl0\x00', r5, 0x700, 0x20, 0x7, 0xfffffff9, {{0x1f, 0x4, 0x2, 0x21, 0x7c, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast2, {[@cipso={0x86, 0x4c, 0xffffffffffffffff, [{0x1, 0xe, "7bbebef2017d91e7a74b5f13"}, {0x1, 0x10, "6a6c44ace2aae544ef1b8734b10f"}, {0x5, 0x7, "52450f209d"}, {0x0, 0x7, "76fd9cc979"}, {0x0, 0xa, "a7412dc8560adb9c"}, {0x0, 0xc, "65c909191937a9910249"}, {0x2, 0x4, "b4b4"}]}, @timestamp_prespec={0x44, 0x1c, 0x9, 0x3, 0x0, [{@loopback, 0x9}, {@local, 0x32b}, {@local, 0x3}]}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000340)={'tunl0\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB='gretap0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="00078000001e008000a4370c3751b551218b9a861a48006700001c049031b58b567978ac1414aaffffffff94040100862d000000400203a7010806e870077bcf000306b00000f1500544fb177794525cdc103346c2671768259389f61e59010a728a8fe0170953fd00000000000000"]}) (async) openat$cgroup_int(r0, &(0x7f0000000d00)='cpu.max\x00', 0x2, 0x0) (async) r9 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r9, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$sock_inet6_SIOCDELRT(r9, 0x890c, &(0x7f00000002c0)={@dev={0xfe, 0x80, '\x00', 0x3e}, @private2, @private2={0xfc, 0x2, '\x00', 0x1}, 0xaef1, 0x4, 0x3, 0x100, 0x40, 0x200}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000380)={'vxcan0\x00', 0x0}) (async) r11 = getpid() syz_open_procfs$userns(r11, 0x0) (async, rerun: 32) syz_open_procfs$userns(r11, &(0x7f0000000cc0)) (async, rerun: 32) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'tunl0\x00', &(0x7f00000003c0)={'ip_vti0\x00', r1, 0x80, 0x50, 0x7ff, 0x81, {{0x13, 0x4, 0x3, 0x39, 0x4c, 0x65, 0x0, 0xcf, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x2e}, @multicast1, {[@timestamp_prespec={0x44, 0x2c, 0x81, 0x3, 0x8, [{@remote, 0x7}, {@dev={0xac, 0x14, 0x14, 0x2e}, 0x837}, {@empty, 0x10000}, {@loopback, 0x401}, {@private=0xa010101, 0x7}]}, @generic={0x86, 0xa, "858a5b0098723964"}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'tunl0\x00', &(0x7f00000004c0)={'syztnl0\x00', r1, 0x80, 0x8000, 0xfffff158, 0x7, {{0xe, 0x4, 0x3, 0x1, 0x38, 0x67, 0x0, 0x9, 0x4a3a065265b55828, 0x0, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@ssrr={0x89, 0x23, 0xa5, [@multicast2, @dev={0xac, 0x14, 0x14, 0x13}, @multicast2, @empty, @rand_addr=0x64010102, @rand_addr=0x64010101, @multicast2, @remote]}]}}}}}) (async) socket$pptp(0x18, 0x1, 0x2) (async) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000740)={'team0\x00', 0x0}) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000780)={'vxcan1\x00', 0x0}) (rerun: 32) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000007c0)={r16, 0x1, 0x6, @broadcast}, 0x10) (async) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b80)={&(0x7f0000001480)={0x5e4, 0x0, 0x406, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r1}, {0x130, 0x2, 0x0, 0x1, [{0x3c, 0x1, @bpf_hash_func={{0x24}, {0x1a}, {0xc, 0x4, [{0x200, 0x0, 0x9, 0x100}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xcc}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff001}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r8}, {0xfc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r10}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r12}, {0x224, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x7c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4c, 0x4, [{0x9, 0x80, 0x40, 0x80}, {0x3fd, 0x9, 0x1, 0x9}, {0x9, 0x40, 0x20, 0x6}, {0x40, 0x40, 0x80, 0x8}, {0x8, 0x40, 0x6, 0x3}, {0x3, 0x81, 0x20, 0x3}, {0x3ff, 0xfd, 0x20, 0x8}, {0x7f, 0x2, 0x2, 0x2}, {0xb6, 0x9, 0xc0, 0x3}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xc6}}}]}}, {{0x8, 0x1, r13}, {0x88, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xb11}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xc54, 0xff, 0x20, 0x9}, {0x7, 0x8, 0x80, 0x9}, {0x34, 0x40, 0x4, 0x9}]}}}, {0x0, 0x1, @lb_port_stats={{{}, {}, {0x0, 0x4, 0x3f}}, {0x0, 0x6, r15}}}]}}, {{0x8, 0x1, r14}, {0x88, 0x2, 0x0, 0x1, [{0xdc, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x5e4}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) 10:29:19 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:19 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gretap0\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x8, 0x1, 0x8, 0x7, {{0x1d, 0x4, 0x1, 0x0, 0x74, 0x66, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, {[@timestamp_addr={0x44, 0x2c, 0x7b, 0x1, 0x1, [{@dev={0xac, 0x14, 0x14, 0x17}, 0x6}, {@remote}, {@multicast2, 0x1}, {@empty, 0x6}, {@local, 0xff}]}, @ssrr={0x89, 0x27, 0x72, [@loopback, @private=0xa010100, @empty, @private=0xa010101, @remote, @multicast2, @empty, @loopback, @rand_addr=0x64010101]}, @timestamp={0x44, 0xc, 0x9d, 0x0, 0xf, [0x8001, 0x9]}]}}}}}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="04002bbd7000fedbdf250100000008003a0004000000050029000100000008003100800000000a000900aaaaaaaaaabb000008000600", @ANYRES32=r0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004810) (async) ptrace$peeksig(0x4209, 0x0, &(0x7f0000000000)={0x3, 0x0, 0x1}, &(0x7f0000000040)=[{}]) [ 160.622098][T29309] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 160.629901][T29309] 10:29:19 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) 10:29:19 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gretap0\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x8, 0x1, 0x8, 0x7, {{0x1d, 0x4, 0x1, 0x0, 0x74, 0x66, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, {[@timestamp_addr={0x44, 0x2c, 0x7b, 0x1, 0x1, [{@dev={0xac, 0x14, 0x14, 0x17}, 0x6}, {@remote}, {@multicast2, 0x1}, {@empty, 0x6}, {@local, 0xff}]}, @ssrr={0x89, 0x27, 0x72, [@loopback, @private=0xa010100, @empty, @private=0xa010101, @remote, @multicast2, @empty, @loopback, @rand_addr=0x64010101]}, @timestamp={0x44, 0xc, 0x9d, 0x0, 0xf, [0x8001, 0x9]}]}}}}}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="04002bbd7000fedbdf250100000008003a0004000000050029000100000008003100800000000a000900aaaaaaaaaabb000008000600", @ANYRES32=r0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004810) ptrace$peeksig(0x4209, 0x0, &(0x7f0000000000)={0x3, 0x0, 0x1}, &(0x7f0000000040)=[{}]) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gretap0\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x8, 0x1, 0x8, 0x7, {{0x1d, 0x4, 0x1, 0x0, 0x74, 0x66, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, {[@timestamp_addr={0x44, 0x2c, 0x7b, 0x1, 0x1, [{@dev={0xac, 0x14, 0x14, 0x17}, 0x6}, {@remote}, {@multicast2, 0x1}, {@empty, 0x6}, {@local, 0xff}]}, @ssrr={0x89, 0x27, 0x72, [@loopback, @private=0xa010100, @empty, @private=0xa010101, @remote, @multicast2, @empty, @loopback, @rand_addr=0x64010101]}, @timestamp={0x44, 0xc, 0x9d, 0x0, 0xf, [0x8001, 0x9]}]}}}}}) (async) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="04002bbd7000fedbdf250100000008003a0004000000050029000100000008003100800000000a000900aaaaaaaaaabb000008000600", @ANYRES32=r0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004810) (async) ptrace$peeksig(0x4209, 0x0, &(0x7f0000000000)={0x3, 0x0, 0x1}, &(0x7f0000000040)=[{}]) (async) 10:29:19 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x243fc4bb44ba9976, 0x8, 0x9, 0x2, {{0x29, 0x4, 0x2, 0x4, 0xa4, 0x68, 0x0, 0x8, 0x29, 0x0, @remote, @empty, {[@timestamp_prespec={0x44, 0xc, 0x84, 0x3, 0x4, [{@multicast2, 0x5}]}, @cipso={0x86, 0x15, 0xffffffffffffffff, [{0x2, 0xa, "de8417ad65900627"}, {0x5, 0x5, "63b927"}]}, @timestamp_prespec={0x44, 0x14, 0x35, 0x3, 0x2, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfffff6de}, {@remote, 0x4}]}, @ssrr={0x89, 0xb, 0xc0, [@multicast1, @broadcast]}, @noop, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x27, 0xdf, [@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @multicast2, @local, @multicast2, @multicast2, @broadcast, @multicast2, @rand_addr=0x64010101]}, @ssrr={0x89, 0x17, 0xc9, [@local, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @multicast2]}, @timestamp_prespec={0x44, 0xc, 0x35, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x78a}]}]}}}}}) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, r0, 0x404, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x400}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6e}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1830}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000080)=0x720) 10:29:19 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) getpid() process_vm_readv(0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) [ 160.717744][T29368] FAULT_INJECTION: forcing a failure. [ 160.717744][T29368] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 160.736275][T29368] CPU: 0 PID: 29368 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 160.746617][T29368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 160.756511][T29368] Call Trace: [ 160.759633][T29368] [ 160.762402][T29368] dump_stack_lvl+0x151/0x1b7 [ 160.766916][T29368] ? io_uring_drop_tctx_refs+0x190/0x190 [ 160.772387][T29368] dump_stack+0x15/0x17 [ 160.776375][T29368] should_fail+0x3c6/0x510 [ 160.780629][T29368] should_fail_alloc_page+0x5a/0x80 [ 160.785673][T29368] prepare_alloc_pages+0x15c/0x700 [ 160.790612][T29368] ? __alloc_pages_bulk+0xf50/0xf50 [ 160.795642][T29368] __alloc_pages+0x138/0x5e0 [ 160.800158][T29368] ? zone_watermark_fast+0x220/0x220 [ 160.805277][T29368] ? is_bpf_text_address+0x172/0x190 [ 160.810399][T29368] pte_alloc_one+0x73/0x1b0 [ 160.814736][T29368] ? pfn_modify_allowed+0x2f0/0x2f0 [ 160.819770][T29368] ? arch_stack_walk+0xf3/0x140 [ 160.824458][T29368] __pte_alloc+0x86/0x350 [ 160.828626][T29368] ? free_pgtables+0x280/0x280 [ 160.833225][T29368] ? _raw_spin_lock+0xa4/0x1b0 [ 160.837824][T29368] ? __kasan_check_write+0x14/0x20 [ 160.842770][T29368] copy_page_range+0x28a8/0x2f90 [ 160.847546][T29368] ? __kasan_slab_alloc+0xb1/0xe0 [ 160.852408][T29368] ? pfn_valid+0x1e0/0x1e0 [ 160.856656][T29368] ? vma_interval_tree_augment_rotate+0x1a3/0x1d0 [ 160.862930][T29368] dup_mm+0xadc/0x12c0 [ 160.866819][T29368] ? copy_init_mm+0x20/0x20 [ 160.871157][T29368] copy_mm+0x107/0x1b0 [ 160.875061][T29368] copy_process+0x12bc/0x3260 [ 160.879574][T29368] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 160.884517][T29368] ? copy_clone_args_from_user+0x744/0x830 [ 160.890157][T29368] kernel_clone+0x21e/0x9e0 [ 160.894500][T29368] ? __delayed_free_task+0x20/0x20 [ 160.899445][T29368] ? vfs_write+0x9ec/0x1110 [ 160.903787][T29368] ? create_io_thread+0x1e0/0x1e0 [ 160.908644][T29368] __x64_sys_clone3+0x376/0x3a0 [ 160.913335][T29368] ? __ia32_sys_clone+0x290/0x290 [ 160.918196][T29368] ? fput+0x1a/0x20 [ 160.921837][T29368] ? debug_smp_processor_id+0x17/0x20 [ 160.927046][T29368] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 160.932948][T29368] ? exit_to_user_mode_prepare+0x39/0xa0 [ 160.938413][T29368] do_syscall_64+0x3d/0xb0 [ 160.942667][T29368] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 160.948394][T29368] RIP: 0033:0x7f52511e2ae9 [ 160.952652][T29368] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 160.972094][T29368] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 160.980334][T29368] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 160.988153][T29368] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 160.995957][T29368] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 161.003768][T29368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:29:19 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 62) 10:29:19 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) getpid() process_vm_readv(0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:19 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) 10:29:19 executing program 5: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x3a4, 0xdf}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) (async) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) (async, rerun: 32) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r1, 0x2f, 0xff, 0xff, 0x0, 0x4, @loopback, @loopback, 0x799, 0x8, 0x2, 0x34}}) (async, rerun: 32) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'gretap0\x00', &(0x7f00000001c0)={'sit0\x00', r1, 0x40, 0x1, 0xf56, 0x5, {{0x1a, 0x4, 0x3, 0x6, 0x68, 0x64, 0x0, 0xd, 0x29, 0x0, @broadcast, @rand_addr=0x64010100, {[@lsrr={0x83, 0x27, 0x7b, [@local, @private=0xa010100, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @empty, @empty, @multicast2]}, @generic={0x89, 0xf, "969c846b8f2c0929c06433317e"}, @noop, @noop, @timestamp_prespec={0x44, 0x1c, 0xca, 0x3, 0x2, [{@multicast2}, {@remote}, {@broadcast}]}]}}}}}) (rerun: 32) socketpair(0x21, 0x1, 0x6, &(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r7, 0x89f8, &(0x7f0000000e40)={'ip_vti0\x00', &(0x7f0000000d80)={'syztnl0\x00', r5, 0x700, 0x20, 0x7, 0xfffffff9, {{0x1f, 0x4, 0x2, 0x21, 0x7c, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast2, {[@cipso={0x86, 0x4c, 0xffffffffffffffff, [{0x1, 0xe, "7bbebef2017d91e7a74b5f13"}, {0x1, 0x10, "6a6c44ace2aae544ef1b8734b10f"}, {0x5, 0x7, "52450f209d"}, {0x0, 0x7, "76fd9cc979"}, {0x0, 0xa, "a7412dc8560adb9c"}, {0x0, 0xc, "65c909191937a9910249"}, {0x2, 0x4, "b4b4"}]}, @timestamp_prespec={0x44, 0x1c, 0x9, 0x3, 0x0, [{@loopback, 0x9}, {@local, 0x32b}, {@local, 0x3}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000340)={'tunl0\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB='gretap0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="00078000001e008000a4370c3751b551218b9a861a48006700001c049031b58b567978ac1414aaffffffff94040100862d000000400203a7010806e870077bcf000306b00000f1500544fb177794525cdc103346c2671768259389f61e59010a728a8fe0170953fd00000000000000"]}) openat$cgroup_int(r0, &(0x7f0000000d00)='cpu.max\x00', 0x2, 0x0) (async) r9 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r9, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$sock_inet6_SIOCDELRT(r9, 0x890c, &(0x7f00000002c0)={@dev={0xfe, 0x80, '\x00', 0x3e}, @private2, @private2={0xfc, 0x2, '\x00', 0x1}, 0xaef1, 0x4, 0x3, 0x100, 0x40, 0x200}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000380)={'vxcan0\x00', 0x0}) (async, rerun: 32) r11 = getpid() (rerun: 32) syz_open_procfs$userns(r11, 0x0) (async, rerun: 64) syz_open_procfs$userns(r11, &(0x7f0000000cc0)) (async, rerun: 64) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'tunl0\x00', &(0x7f00000003c0)={'ip_vti0\x00', r1, 0x80, 0x50, 0x7ff, 0x81, {{0x13, 0x4, 0x3, 0x39, 0x4c, 0x65, 0x0, 0xcf, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x2e}, @multicast1, {[@timestamp_prespec={0x44, 0x2c, 0x81, 0x3, 0x8, [{@remote, 0x7}, {@dev={0xac, 0x14, 0x14, 0x2e}, 0x837}, {@empty, 0x10000}, {@loopback, 0x401}, {@private=0xa010101, 0x7}]}, @generic={0x86, 0xa, "858a5b0098723964"}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'tunl0\x00', &(0x7f00000004c0)={'syztnl0\x00', r1, 0x80, 0x8000, 0xfffff158, 0x7, {{0xe, 0x4, 0x3, 0x1, 0x38, 0x67, 0x0, 0x9, 0x4a3a065265b55828, 0x0, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@ssrr={0x89, 0x23, 0xa5, [@multicast2, @dev={0xac, 0x14, 0x14, 0x13}, @multicast2, @empty, @rand_addr=0x64010102, @rand_addr=0x64010101, @multicast2, @remote]}]}}}}}) (async) socket$pptp(0x18, 0x1, 0x2) (async) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000740)={'team0\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000780)={'vxcan1\x00', 0x0}) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000007c0)={r16, 0x1, 0x6, @broadcast}, 0x10) (async) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000bc0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b80)={&(0x7f0000001480)={0x5e4, 0x0, 0x406, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r1}, {0x130, 0x2, 0x0, 0x1, [{0x3c, 0x1, @bpf_hash_func={{0x24}, {0x1a}, {0xc, 0x4, [{0x200, 0x0, 0x9, 0x100}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xcc}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff001}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r8}, {0xfc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r10}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r12}, {0x224, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x7c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4c, 0x4, [{0x9, 0x80, 0x40, 0x80}, {0x3fd, 0x9, 0x1, 0x9}, {0x9, 0x40, 0x20, 0x6}, {0x40, 0x40, 0x80, 0x8}, {0x8, 0x40, 0x6, 0x3}, {0x3, 0x81, 0x20, 0x3}, {0x3ff, 0xfd, 0x20, 0x8}, {0x7f, 0x2, 0x2, 0x2}, {0xb6, 0x9, 0xc0, 0x3}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xc6}}}]}}, {{0x8, 0x1, r13}, {0x88, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xb11}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xc54, 0xff, 0x20, 0x9}, {0x7, 0x8, 0x80, 0x9}, {0x34, 0x40, 0x4, 0x9}]}}}, {0x0, 0x1, @lb_port_stats={{{}, {}, {0x0, 0x4, 0x3f}}, {0x0, 0x6, r15}}}]}}, {{0x8, 0x1, r14}, {0x88, 0x2, 0x0, 0x1, [{0xdc, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x5e4}, 0x1, 0x0, 0x0, 0x24004001}, 0x0) 10:29:19 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x243fc4bb44ba9976, 0x8, 0x9, 0x2, {{0x29, 0x4, 0x2, 0x4, 0xa4, 0x68, 0x0, 0x8, 0x29, 0x0, @remote, @empty, {[@timestamp_prespec={0x44, 0xc, 0x84, 0x3, 0x4, [{@multicast2, 0x5}]}, @cipso={0x86, 0x15, 0xffffffffffffffff, [{0x2, 0xa, "de8417ad65900627"}, {0x5, 0x5, "63b927"}]}, @timestamp_prespec={0x44, 0x14, 0x35, 0x3, 0x2, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfffff6de}, {@remote, 0x4}]}, @ssrr={0x89, 0xb, 0xc0, [@multicast1, @broadcast]}, @noop, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x27, 0xdf, [@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @multicast2, @local, @multicast2, @multicast2, @broadcast, @multicast2, @rand_addr=0x64010101]}, @ssrr={0x89, 0x17, 0xc9, [@local, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @multicast2]}, @timestamp_prespec={0x44, 0xc, 0x35, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x78a}]}]}}}}}) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, r0, 0x404, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x400}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6e}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1830}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000080)=0x720) 10:29:19 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}, {&(0x7f0000000000)=""/118, 0x76}, {&(0x7f0000000080)}], 0x4, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)={0x14}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a00), r0) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x20, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}]}, 0x20}}, 0x0) sendmsg$IEEE802154_ASSOCIATE_RESP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x18080200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r2, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_STATUS={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) 10:29:19 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) getpid() process_vm_readv(0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/218, 0xda}], 0x6, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:19 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}, {&(0x7f0000000000)=""/118, 0x76}, {&(0x7f0000000080)}], 0x4, 0x0) (async) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)={0x14}, 0x14}}, 0x0) (async) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a00), r0) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x20, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}]}, 0x20}}, 0x0) (async, rerun: 64) sendmsg$IEEE802154_ASSOCIATE_RESP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x18080200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r2, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_STATUS={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) (rerun: 64) 10:29:19 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x243fc4bb44ba9976, 0x8, 0x9, 0x2, {{0x29, 0x4, 0x2, 0x4, 0xa4, 0x68, 0x0, 0x8, 0x29, 0x0, @remote, @empty, {[@timestamp_prespec={0x44, 0xc, 0x84, 0x3, 0x4, [{@multicast2, 0x5}]}, @cipso={0x86, 0x15, 0xffffffffffffffff, [{0x2, 0xa, "de8417ad65900627"}, {0x5, 0x5, "63b927"}]}, @timestamp_prespec={0x44, 0x14, 0x35, 0x3, 0x2, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfffff6de}, {@remote, 0x4}]}, @ssrr={0x89, 0xb, 0xc0, [@multicast1, @broadcast]}, @noop, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x27, 0xdf, [@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @multicast2, @local, @multicast2, @multicast2, @broadcast, @multicast2, @rand_addr=0x64010101]}, @ssrr={0x89, 0x17, 0xc9, [@local, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @multicast2]}, @timestamp_prespec={0x44, 0xc, 0x35, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x78a}]}]}}}}}) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, r0, 0x404, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x400}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6e}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1830}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000080)=0x720) [ 161.011580][T29368] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 161.019398][T29368] 10:29:19 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) [ 161.067891][T29392] FAULT_INJECTION: forcing a failure. [ 161.067891][T29392] name failslab, interval 1, probability 0, space 0, times 0 [ 161.083214][T29392] CPU: 0 PID: 29392 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 161.093458][T29392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 161.103346][T29392] Call Trace: [ 161.106470][T29392] [ 161.109245][T29392] dump_stack_lvl+0x151/0x1b7 [ 161.113761][T29392] ? io_uring_drop_tctx_refs+0x190/0x190 [ 161.119229][T29392] dump_stack+0x15/0x17 [ 161.123218][T29392] should_fail+0x3c6/0x510 [ 161.127471][T29392] __should_failslab+0xa4/0xe0 [ 161.132074][T29392] ? anon_vma_clone+0x9a/0x500 [ 161.136671][T29392] should_failslab+0x9/0x20 [ 161.141010][T29392] slab_pre_alloc_hook+0x37/0xd0 [ 161.145787][T29392] ? anon_vma_clone+0x9a/0x500 [ 161.150391][T29392] kmem_cache_alloc+0x44/0x200 [ 161.154987][T29392] anon_vma_clone+0x9a/0x500 [ 161.159412][T29392] anon_vma_fork+0x91/0x4e0 [ 161.163750][T29392] ? anon_vma_name+0x43/0x70 [ 161.168179][T29392] ? vm_area_dup+0x17a/0x230 [ 161.172634][T29392] dup_mm+0x8c5/0x12c0 [ 161.176512][T29392] ? copy_init_mm+0x20/0x20 [ 161.180851][T29392] copy_mm+0x107/0x1b0 [ 161.184755][T29392] copy_process+0x12bc/0x3260 [ 161.189272][T29392] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 161.194214][T29392] ? copy_clone_args_from_user+0x744/0x830 [ 161.199855][T29392] kernel_clone+0x21e/0x9e0 [ 161.204197][T29392] ? __delayed_free_task+0x20/0x20 [ 161.209144][T29392] ? vfs_write+0x9ec/0x1110 [ 161.213485][T29392] ? create_io_thread+0x1e0/0x1e0 [ 161.218343][T29392] __x64_sys_clone3+0x376/0x3a0 [ 161.223031][T29392] ? __ia32_sys_clone+0x290/0x290 [ 161.227894][T29392] ? fput+0x1a/0x20 [ 161.231535][T29392] ? debug_smp_processor_id+0x17/0x20 [ 161.236751][T29392] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 161.242647][T29392] ? exit_to_user_mode_prepare+0x39/0xa0 [ 161.248206][T29392] do_syscall_64+0x3d/0xb0 [ 161.252451][T29392] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 161.258188][T29392] RIP: 0033:0x7f52511e2ae9 [ 161.262434][T29392] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 161.281888][T29392] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 161.290118][T29392] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 161.297934][T29392] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 161.305742][T29392] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 10:29:19 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, 0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:19 executing program 1: r0 = getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') process_vm_readv(r0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{0x0}, {0x0}], 0x2, 0x0) 10:29:19 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 63) 10:29:19 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}, {&(0x7f0000000000)=""/118, 0x76}, {&(0x7f0000000080)}], 0x4, 0x0) (async, rerun: 32) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)={0x14}, 0x14}}, 0x0) (async) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a00), r0) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x20, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}]}, 0x20}}, 0x0) (async, rerun: 32) sendmsg$IEEE802154_ASSOCIATE_RESP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x18080200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r2, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_STATUS={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) (rerun: 32) 10:29:19 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x243fc4bb44ba9976, 0x8, 0x9, 0x2, {{0x29, 0x4, 0x2, 0x4, 0xa4, 0x68, 0x0, 0x8, 0x29, 0x0, @remote, @empty, {[@timestamp_prespec={0x44, 0xc, 0x84, 0x3, 0x4, [{@multicast2, 0x5}]}, @cipso={0x86, 0x15, 0xffffffffffffffff, [{0x2, 0xa, "de8417ad65900627"}, {0x5, 0x5, "63b927"}]}, @timestamp_prespec={0x44, 0x14, 0x35, 0x3, 0x2, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfffff6de}, {@remote, 0x4}]}, @ssrr={0x89, 0xb, 0xc0, [@multicast1, @broadcast]}, @noop, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x27, 0xdf, [@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @multicast2, @local, @multicast2, @multicast2, @broadcast, @multicast2, @rand_addr=0x64010101]}, @ssrr={0x89, 0x17, 0xc9, [@local, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @multicast2]}, @timestamp_prespec={0x44, 0xc, 0x35, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x78a}]}]}}}}}) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, r0, 0x404, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x400}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6e}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1830}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000080)=0x720) 10:29:19 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) write$tcp_mem(r1, &(0x7f0000000180)={0x3f55, 0x20, 0x1f88, 0x20, 0x1}, 0x48) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x9}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x80) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:19 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, 0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:19 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x243fc4bb44ba9976, 0x8, 0x9, 0x2, {{0x29, 0x4, 0x2, 0x4, 0xa4, 0x68, 0x0, 0x8, 0x29, 0x0, @remote, @empty, {[@timestamp_prespec={0x44, 0xc, 0x84, 0x3, 0x4, [{@multicast2, 0x5}]}, @cipso={0x86, 0x15, 0xffffffffffffffff, [{0x2, 0xa, "de8417ad65900627"}, {0x5, 0x5, "63b927"}]}, @timestamp_prespec={0x44, 0x14, 0x35, 0x3, 0x2, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfffff6de}, {@remote, 0x4}]}, @ssrr={0x89, 0xb, 0xc0, [@multicast1, @broadcast]}, @noop, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x27, 0xdf, [@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @multicast2, @local, @multicast2, @multicast2, @broadcast, @multicast2, @rand_addr=0x64010101]}, @ssrr={0x89, 0x17, 0xc9, [@local, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @multicast2]}, @timestamp_prespec={0x44, 0xc, 0x35, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x78a}]}]}}}}}) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000080)=0x720) [ 161.313553][T29392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 161.321365][T29392] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 161.329180][T29392] 10:29:19 executing program 1: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001080)={'wpan3\x00'}) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, r1, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x81}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x6}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xba}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x4c001}, 0x4c001) pipe(&(0x7f0000000100)) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:19 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) write$tcp_mem(r1, &(0x7f0000000180)={0x3f55, 0x20, 0x1f88, 0x20, 0x1}, 0x48) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x9}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x80) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) (async) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) (async) open(0x0, 0x680002, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) (async) write$tcp_mem(r1, &(0x7f0000000180)={0x3f55, 0x20, 0x1f88, 0x20, 0x1}, 0x48) (async) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x9}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x80) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 10:29:19 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, 0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:19 executing program 3: r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@mpls_getroute={0xb0, 0x1a, 0x400, 0x70bd2c, 0x25dfdbfe, {0x1c, 0x10, 0x80, 0x9, 0xff, 0x2, 0xfd, 0x9, 0x900}, [@RTA_NEWDST={0x84, 0x13, [{0x6, 0x0, 0x1}, {0x8001, 0x0, 0x1}, {0x0, 0x0, 0x1}, {0x1000}, {0x84, 0x0, 0x1}, {0x2}, {0xc9c}, {0x84b, 0x0, 0x1}, {0xfffe0, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0x20, 0x0, 0x1}, {0x6}, {0x6, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x2}, {0xf8000, 0x0, 0x1}, {0x2}, {}, {0x7ff}, {0x6, 0x0, 0x1}, {0x7f, 0x0, 0x1}, {0x800}, {0xfc8, 0x0, 0x1}, {0x9}, {0x8}, {0x1}, {0x1, 0x0, 0x1}, {0x4}, {0x9}, {0x1000}, {0xd373, 0x0, 0x1}, {0x8, 0x0, 0x1}]}, @RTA_OIF={0x8}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x4d}]}, 0xb0}, 0x1, 0x0, 0x0, 0x44}, 0x4000004) process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000000040)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}, {&(0x7f0000000000)=""/23, 0x17}], 0x3, 0x0) 10:29:19 executing program 1: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001080)={'wpan3\x00'}) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, r1, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x81}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x6}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xba}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x4c001}, 0x4c001) pipe(&(0x7f0000000100)) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:19 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000080)=0x720) [ 161.380142][T29414] FAULT_INJECTION: forcing a failure. [ 161.380142][T29414] name failslab, interval 1, probability 0, space 0, times 0 [ 161.409807][T29414] CPU: 1 PID: 29414 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 161.420057][T29414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 161.429949][T29414] Call Trace: [ 161.433071][T29414] [ 161.435854][T29414] dump_stack_lvl+0x151/0x1b7 [ 161.440367][T29414] ? io_uring_drop_tctx_refs+0x190/0x190 [ 161.445834][T29414] dump_stack+0x15/0x17 [ 161.449832][T29414] should_fail+0x3c6/0x510 [ 161.454165][T29414] __should_failslab+0xa4/0xe0 [ 161.458761][T29414] ? anon_vma_clone+0x9a/0x500 [ 161.463360][T29414] should_failslab+0x9/0x20 [ 161.467700][T29414] slab_pre_alloc_hook+0x37/0xd0 [ 161.472476][T29414] ? anon_vma_clone+0x9a/0x500 [ 161.477075][T29414] kmem_cache_alloc+0x44/0x200 [ 161.481674][T29414] anon_vma_clone+0x9a/0x500 [ 161.486105][T29414] anon_vma_fork+0x91/0x4e0 [ 161.490444][T29414] ? anon_vma_name+0x43/0x70 [ 161.494868][T29414] ? vm_area_dup+0x17a/0x230 [ 161.499292][T29414] dup_mm+0x8c5/0x12c0 [ 161.503195][T29414] ? copy_init_mm+0x20/0x20 [ 161.507534][T29414] copy_mm+0x107/0x1b0 [ 161.511438][T29414] copy_process+0x12bc/0x3260 [ 161.515951][T29414] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 161.520899][T29414] ? copy_clone_args_from_user+0x744/0x830 [ 161.526539][T29414] kernel_clone+0x21e/0x9e0 [ 161.530880][T29414] ? __delayed_free_task+0x20/0x20 [ 161.535827][T29414] ? vfs_write+0x9ec/0x1110 [ 161.540167][T29414] ? create_io_thread+0x1e0/0x1e0 [ 161.545028][T29414] __x64_sys_clone3+0x376/0x3a0 [ 161.549714][T29414] ? __ia32_sys_clone+0x290/0x290 [ 161.554574][T29414] ? fput+0x1a/0x20 [ 161.558218][T29414] ? debug_smp_processor_id+0x17/0x20 [ 161.563425][T29414] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 161.569328][T29414] ? exit_to_user_mode_prepare+0x39/0xa0 [ 161.574799][T29414] do_syscall_64+0x3d/0xb0 [ 161.579048][T29414] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 161.584777][T29414] RIP: 0033:0x7f52511e2ae9 [ 161.589034][T29414] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 161.608472][T29414] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 161.616714][T29414] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 10:29:20 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 64) 10:29:20 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x5, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:20 executing program 1: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001080)={'wpan3\x00'}) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, r1, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x81}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x6}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xba}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x4c001}, 0x4c001) pipe(&(0x7f0000000100)) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:20 executing program 4: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000080)=0x720) 10:29:20 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) (async, rerun: 64) r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) (async, rerun: 64) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) (async) write$tcp_mem(r1, &(0x7f0000000180)={0x3f55, 0x20, 0x1f88, 0x20, 0x1}, 0x48) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x9}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x80) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:20 executing program 3: r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) (async) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@mpls_getroute={0xb0, 0x1a, 0x400, 0x70bd2c, 0x25dfdbfe, {0x1c, 0x10, 0x80, 0x9, 0xff, 0x2, 0xfd, 0x9, 0x900}, [@RTA_NEWDST={0x84, 0x13, [{0x6, 0x0, 0x1}, {0x8001, 0x0, 0x1}, {0x0, 0x0, 0x1}, {0x1000}, {0x84, 0x0, 0x1}, {0x2}, {0xc9c}, {0x84b, 0x0, 0x1}, {0xfffe0, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0x20, 0x0, 0x1}, {0x6}, {0x6, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x2}, {0xf8000, 0x0, 0x1}, {0x2}, {}, {0x7ff}, {0x6, 0x0, 0x1}, {0x7f, 0x0, 0x1}, {0x800}, {0xfc8, 0x0, 0x1}, {0x9}, {0x8}, {0x1}, {0x1, 0x0, 0x1}, {0x4}, {0x9}, {0x1000}, {0xd373, 0x0, 0x1}, {0x8, 0x0, 0x1}]}, @RTA_OIF={0x8}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x4d}]}, 0xb0}, 0x1, 0x0, 0x0, 0x44}, 0x4000004) (async) process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000000040)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}, {&(0x7f0000000000)=""/23, 0x17}], 0x3, 0x0) [ 161.624528][T29414] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 161.632342][T29414] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 161.640149][T29414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 161.647962][T29414] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 161.655775][T29414] [ 161.675330][T29443] FAULT_INJECTION: forcing a failure. 10:29:20 executing program 1: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001080)={'wpan3\x00'}) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, r1, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x81}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x6}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xba}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x4c001}, 0x4c001) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:20 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:20 executing program 3: r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@mpls_getroute={0xb0, 0x1a, 0x400, 0x70bd2c, 0x25dfdbfe, {0x1c, 0x10, 0x80, 0x9, 0xff, 0x2, 0xfd, 0x9, 0x900}, [@RTA_NEWDST={0x84, 0x13, [{0x6, 0x0, 0x1}, {0x8001, 0x0, 0x1}, {0x0, 0x0, 0x1}, {0x1000}, {0x84, 0x0, 0x1}, {0x2}, {0xc9c}, {0x84b, 0x0, 0x1}, {0xfffe0, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0x20, 0x0, 0x1}, {0x6}, {0x6, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x2}, {0xf8000, 0x0, 0x1}, {0x2}, {}, {0x7ff}, {0x6, 0x0, 0x1}, {0x7f, 0x0, 0x1}, {0x800}, {0xfc8, 0x0, 0x1}, {0x9}, {0x8}, {0x1}, {0x1, 0x0, 0x1}, {0x4}, {0x9}, {0x1000}, {0xd373, 0x0, 0x1}, {0x8, 0x0, 0x1}]}, @RTA_OIF={0x8}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x4d}]}, 0xb0}, 0x1, 0x0, 0x0, 0x44}, 0x4000004) (async) process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000000040)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}, {&(0x7f0000000000)=""/23, 0x17}], 0x3, 0x0) 10:29:20 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000080)=0x720) [ 161.675330][T29443] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 161.703464][T29443] CPU: 1 PID: 29443 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 161.713635][T29443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 161.723519][T29443] Call Trace: [ 161.726723][T29443] 10:29:20 executing program 3: r0 = getpid() process_vm_readv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/214, 0xd6}], 0x1, &(0x7f0000000040), 0x0, 0x0) 10:29:20 executing program 3: r0 = getpid() process_vm_readv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/214, 0xd6}], 0x1, &(0x7f0000000040), 0x0, 0x0) [ 161.729501][T29443] dump_stack_lvl+0x151/0x1b7 [ 161.734109][T29443] ? io_uring_drop_tctx_refs+0x190/0x190 [ 161.739580][T29443] ? __update_load_avg_cfs_rq+0xb1/0x2f0 [ 161.745042][T29443] dump_stack+0x15/0x17 [ 161.749207][T29443] should_fail+0x3c6/0x510 [ 161.753458][T29443] should_fail_alloc_page+0x5a/0x80 [ 161.758492][T29443] prepare_alloc_pages+0x15c/0x700 [ 161.763442][T29443] ? __alloc_pages_bulk+0xf50/0xf50 [ 161.768472][T29443] ? sched_clock+0x9/0x10 [ 161.772641][T29443] __alloc_pages+0x138/0x5e0 [ 161.777068][T29443] ? zone_watermark_fast+0x220/0x220 [ 161.782188][T29443] ? is_bpf_text_address+0x172/0x190 [ 161.787305][T29443] pte_alloc_one+0x73/0x1b0 [ 161.791645][T29443] ? pfn_modify_allowed+0x2f0/0x2f0 [ 161.796676][T29443] ? arch_stack_walk+0xf3/0x140 [ 161.801361][T29443] __pte_alloc+0x86/0x350 [ 161.805530][T29443] ? free_pgtables+0x280/0x280 [ 161.810126][T29443] ? _raw_spin_lock+0xa4/0x1b0 [ 161.814726][T29443] ? __kasan_check_write+0x14/0x20 [ 161.819685][T29443] copy_page_range+0x28a8/0x2f90 [ 161.824457][T29443] ? __kasan_slab_alloc+0xb1/0xe0 [ 161.829312][T29443] ? pfn_valid+0x1e0/0x1e0 [ 161.833561][T29443] ? vma_gap_callbacks_rotate+0x1b7/0x210 [ 161.839116][T29443] ? __rb_insert_augmented+0x5de/0x610 [ 161.844530][T29443] dup_mm+0xadc/0x12c0 [ 161.848432][T29443] ? copy_init_mm+0x20/0x20 [ 161.852773][T29443] copy_mm+0x107/0x1b0 [ 161.856674][T29443] copy_process+0x12bc/0x3260 [ 161.861188][T29443] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 161.866131][T29443] ? copy_clone_args_from_user+0x744/0x830 [ 161.871774][T29443] kernel_clone+0x21e/0x9e0 [ 161.876112][T29443] ? __delayed_free_task+0x20/0x20 [ 161.881074][T29443] ? vfs_write+0x9ec/0x1110 [ 161.885408][T29443] ? create_io_thread+0x1e0/0x1e0 [ 161.890262][T29443] __x64_sys_clone3+0x376/0x3a0 [ 161.894950][T29443] ? __ia32_sys_clone+0x290/0x290 [ 161.899819][T29443] ? fput+0x1a/0x20 [ 161.903457][T29443] ? debug_smp_processor_id+0x17/0x20 [ 161.908667][T29443] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 161.914681][T29443] ? exit_to_user_mode_prepare+0x39/0xa0 [ 161.920145][T29443] do_syscall_64+0x3d/0xb0 [ 161.924398][T29443] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 161.930123][T29443] RIP: 0033:0x7f52511e2ae9 [ 161.934383][T29443] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 161.953817][T29443] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 161.962069][T29443] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 161.969871][T29443] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 10:29:20 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 65) 10:29:20 executing program 3: getpid() (async) r0 = getpid() process_vm_readv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/214, 0xd6}], 0x1, &(0x7f0000000040), 0x0, 0x0) 10:29:20 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x10fb40, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x6, 0xa, "ee066bba82f97eee18d6"}) prctl$PR_GET_TIMERSLACK(0x1e) 10:29:20 executing program 4: r0 = openat$random(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000080)=0x720) 10:29:20 executing program 1: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001080)={'wpan3\x00'}) syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), 0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:20 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}], 0x3, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) [ 161.977681][T29443] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 161.985499][T29443] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 161.993305][T29443] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 162.001127][T29443] 10:29:20 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}], 0x3, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:20 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x10fb40, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x6, 0xa, "ee066bba82f97eee18d6"}) prctl$PR_GET_TIMERSLACK(0x1e) 10:29:20 executing program 4: r0 = openat$random(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000080)=0x720) 10:29:20 executing program 1: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001080)={'wpan3\x00'}) syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), 0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:20 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}], 0x3, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:20 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x29, 0x3f, 0x78, 0xc4b1, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x20}, 0x8, 0x8, 0x9, 0x1}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'sit0\x00', &(0x7f00000000c0)={'tunl0\x00', r1, 0x20, 0x40, 0x8, 0x23080ac0, {{0x1c, 0x4, 0x3, 0x28, 0x70, 0x68, 0x0, 0x9, 0x2f, 0x0, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x29}, {[@generic={0x7, 0x6, "822f1985"}, @ssrr={0x89, 0x1f, 0x48, [@local, @local, @private=0xa010101, @rand_addr=0x64010102, @broadcast, @multicast1, @dev={0xac, 0x14, 0x14, 0x15}]}, @cipso={0x86, 0x37, 0x3, [{0x5, 0xc, "3c33e9749394765fba64"}, {0x6, 0x3, 'c'}, {0x500b33dd94dfacd7, 0xe, "89e0985de4dcac5fb6276da1"}, {0x6, 0xd, "f42d4e37da3e08fa44081a"}, {0x7, 0x7, "e05649579e"}]}]}}}}}) 10:29:20 executing program 4: r0 = openat$random(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000080)=0x720) [ 162.062102][T29487] FAULT_INJECTION: forcing a failure. [ 162.062102][T29487] name failslab, interval 1, probability 0, space 0, times 0 [ 162.084601][T29487] CPU: 0 PID: 29487 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 162.094765][T29487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 162.104659][T29487] Call Trace: [ 162.107783][T29487] [ 162.110561][T29487] dump_stack_lvl+0x151/0x1b7 [ 162.115076][T29487] ? io_uring_drop_tctx_refs+0x190/0x190 [ 162.120543][T29487] dump_stack+0x15/0x17 [ 162.124534][T29487] should_fail+0x3c6/0x510 [ 162.128882][T29487] __should_failslab+0xa4/0xe0 [ 162.133479][T29487] ? anon_vma_fork+0x1df/0x4e0 [ 162.138081][T29487] should_failslab+0x9/0x20 [ 162.142419][T29487] slab_pre_alloc_hook+0x37/0xd0 [ 162.147192][T29487] ? anon_vma_fork+0x1df/0x4e0 [ 162.151795][T29487] kmem_cache_alloc+0x44/0x200 [ 162.156393][T29487] anon_vma_fork+0x1df/0x4e0 [ 162.160825][T29487] dup_mm+0x8c5/0x12c0 [ 162.164725][T29487] ? copy_init_mm+0x20/0x20 [ 162.169064][T29487] copy_mm+0x107/0x1b0 [ 162.172972][T29487] copy_process+0x12bc/0x3260 [ 162.177486][T29487] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 162.182432][T29487] ? copy_clone_args_from_user+0x744/0x830 [ 162.188072][T29487] kernel_clone+0x21e/0x9e0 [ 162.192412][T29487] ? __delayed_free_task+0x20/0x20 [ 162.197358][T29487] ? vfs_write+0x9ec/0x1110 [ 162.201698][T29487] ? create_io_thread+0x1e0/0x1e0 [ 162.206556][T29487] __x64_sys_clone3+0x376/0x3a0 [ 162.211245][T29487] ? __ia32_sys_clone+0x290/0x290 [ 162.216115][T29487] ? fput+0x1a/0x20 [ 162.219749][T29487] ? debug_smp_processor_id+0x17/0x20 [ 162.224959][T29487] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 162.230858][T29487] ? exit_to_user_mode_prepare+0x39/0xa0 [ 162.236326][T29487] do_syscall_64+0x3d/0xb0 [ 162.240580][T29487] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 162.246307][T29487] RIP: 0033:0x7f52511e2ae9 [ 162.250560][T29487] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 162.270000][T29487] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 162.278245][T29487] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 162.286056][T29487] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 162.293867][T29487] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 162.301679][T29487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:29:20 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 66) 10:29:20 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x10fb40, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x6, 0xa, "ee066bba82f97eee18d6"}) (async) prctl$PR_GET_TIMERSLACK(0x1e) 10:29:20 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {0x0}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:20 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000080)=0x720) 10:29:20 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x29, 0x3f, 0x78, 0xc4b1, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x20}, 0x8, 0x8, 0x9, 0x1}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'sit0\x00', &(0x7f00000000c0)={'tunl0\x00', r1, 0x20, 0x40, 0x8, 0x23080ac0, {{0x1c, 0x4, 0x3, 0x28, 0x70, 0x68, 0x0, 0x9, 0x2f, 0x0, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x29}, {[@generic={0x7, 0x6, "822f1985"}, @ssrr={0x89, 0x1f, 0x48, [@local, @local, @private=0xa010101, @rand_addr=0x64010102, @broadcast, @multicast1, @dev={0xac, 0x14, 0x14, 0x15}]}, @cipso={0x86, 0x37, 0x3, [{0x5, 0xc, "3c33e9749394765fba64"}, {0x6, 0x3, 'c'}, {0x500b33dd94dfacd7, 0xe, "89e0985de4dcac5fb6276da1"}, {0x6, 0xd, "f42d4e37da3e08fa44081a"}, {0x7, 0x7, "e05649579e"}]}]}}}}}) 10:29:20 executing program 1: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001080)={'wpan3\x00'}) syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), 0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:20 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r2, 0x0, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7ff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x4000000) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000180)) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r2, 0x800, 0x70bd27, 0x1, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x3}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x9}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x40000) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="00000080", @ANYRES16=r2, @ANYBLOB="000827bd7000ffdbdf250700000005002d000100000005002e000000000008003c000400000005002a00000000000500300001000000080031001f00000005002f0001000000"], 0x4c}, 0x1, 0x0, 0x0, 0x200080c4}, 0x4000) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r2, 0x100, 0x70bd2b, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x4000040) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:20 executing program 4: openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000080)=0x720) 10:29:20 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) open(0x0, 0x680002, 0x0) (async) r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x29, 0x3f, 0x78, 0xc4b1, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x20}, 0x8, 0x8, 0x9, 0x1}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'sit0\x00', &(0x7f00000000c0)={'tunl0\x00', r1, 0x20, 0x40, 0x8, 0x23080ac0, {{0x1c, 0x4, 0x3, 0x28, 0x70, 0x68, 0x0, 0x9, 0x2f, 0x0, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x29}, {[@generic={0x7, 0x6, "822f1985"}, @ssrr={0x89, 0x1f, 0x48, [@local, @local, @private=0xa010101, @rand_addr=0x64010102, @broadcast, @multicast1, @dev={0xac, 0x14, 0x14, 0x15}]}, @cipso={0x86, 0x37, 0x3, [{0x5, 0xc, "3c33e9749394765fba64"}, {0x6, 0x3, 'c'}, {0x500b33dd94dfacd7, 0xe, "89e0985de4dcac5fb6276da1"}, {0x6, 0xd, "f42d4e37da3e08fa44081a"}, {0x7, 0x7, "e05649579e"}]}]}}}}}) 10:29:20 executing program 1: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001080)={'wpan3\x00'}) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x81}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x6}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xba}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x4c001}, 0x4c001) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) [ 162.309491][T29487] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 162.317310][T29487] 10:29:20 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {0x0}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:20 executing program 1: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x81}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x6}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xba}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x4c001}, 0x4c001) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) [ 162.364821][T29514] FAULT_INJECTION: forcing a failure. [ 162.364821][T29514] name failslab, interval 1, probability 0, space 0, times 0 [ 162.386545][T29514] CPU: 0 PID: 29514 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 162.396704][T29514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 162.406598][T29514] Call Trace: [ 162.409719][T29514] [ 162.412499][T29514] dump_stack_lvl+0x151/0x1b7 [ 162.417012][T29514] ? io_uring_drop_tctx_refs+0x190/0x190 [ 162.422475][T29514] dump_stack+0x15/0x17 [ 162.426463][T29514] should_fail+0x3c6/0x510 [ 162.430803][T29514] __should_failslab+0xa4/0xe0 [ 162.435403][T29514] ? vm_area_dup+0x26/0x230 [ 162.439750][T29514] should_failslab+0x9/0x20 [ 162.444084][T29514] slab_pre_alloc_hook+0x37/0xd0 [ 162.448856][T29514] ? vm_area_dup+0x26/0x230 [ 162.453198][T29514] kmem_cache_alloc+0x44/0x200 [ 162.457795][T29514] vm_area_dup+0x26/0x230 [ 162.461963][T29514] dup_mm+0x81b/0x12c0 [ 162.465869][T29514] ? copy_init_mm+0x20/0x20 [ 162.470214][T29514] copy_mm+0x107/0x1b0 [ 162.474114][T29514] copy_process+0x12bc/0x3260 [ 162.478628][T29514] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 162.483574][T29514] ? copy_clone_args_from_user+0x744/0x830 [ 162.489228][T29514] kernel_clone+0x21e/0x9e0 [ 162.493557][T29514] ? __delayed_free_task+0x20/0x20 [ 162.498501][T29514] ? vfs_write+0x9ec/0x1110 [ 162.502841][T29514] ? create_io_thread+0x1e0/0x1e0 [ 162.507701][T29514] __x64_sys_clone3+0x376/0x3a0 [ 162.512389][T29514] ? __ia32_sys_clone+0x290/0x290 [ 162.517250][T29514] ? fput+0x1a/0x20 [ 162.520896][T29514] ? debug_smp_processor_id+0x17/0x20 [ 162.526101][T29514] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 162.532002][T29514] ? exit_to_user_mode_prepare+0x39/0xa0 [ 162.537478][T29514] do_syscall_64+0x3d/0xb0 [ 162.541723][T29514] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 162.547458][T29514] RIP: 0033:0x7f52511e2ae9 [ 162.551709][T29514] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 162.571146][T29514] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 162.579390][T29514] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 162.587204][T29514] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 162.595012][T29514] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 162.602832][T29514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:29:21 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 67) 10:29:21 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000080)=""/184, 0xb8}, {0x0}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:21 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r2, 0x0, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7ff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x4000000) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000180)) (async) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r2, 0x800, 0x70bd27, 0x1, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x3}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x9}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x40000) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="00000080", @ANYRES16=r2, @ANYBLOB="000827bd7000ffdbdf250700000005002d000100000005002e000000000008003c000400000005002a00000000000500300001000000080031001f00000005002f0001000000"], 0x4c}, 0x1, 0x0, 0x0, 0x200080c4}, 0x4000) (async) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r2, 0x100, 0x70bd2b, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x4000040) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:21 executing program 1: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x81}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x6}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xba}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x4c001}, 0x4c001) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:21 executing program 4: openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000080)=0x720) 10:29:21 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) process_vm_readv(0x0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/80, 0x50}, {&(0x7f0000000080)}, {&(0x7f00000000c0)=""/27, 0x1b}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000140)=""/166, 0xa6}, {&(0x7f0000000200)=""/124, 0x7c}, {&(0x7f0000000280)=""/245, 0xf5}, {&(0x7f0000000400)=""/26, 0x1a}, {&(0x7f0000000440)=""/134, 0x86}], 0x5, 0x0) 10:29:21 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) process_vm_readv(0x0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/80, 0x50}, {&(0x7f0000000080)}, {&(0x7f00000000c0)=""/27, 0x1b}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000140)=""/166, 0xa6}, {&(0x7f0000000200)=""/124, 0x7c}, {&(0x7f0000000280)=""/245, 0xf5}, {&(0x7f0000000400)=""/26, 0x1a}, {&(0x7f0000000440)=""/134, 0x86}], 0x5, 0x0) 10:29:21 executing program 1: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x81}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x6}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xba}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x4c001}, 0x4c001) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:21 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000140)=""/213, 0xd5}], 0x3, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) [ 162.610633][T29514] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 162.618455][T29514] 10:29:21 executing program 4: openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000080)=0x720) 10:29:21 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r2, 0x0, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7ff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x4000000) (async) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000180)) (async) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r2, 0x800, 0x70bd27, 0x1, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x3}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x9}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x40000) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="00000080", @ANYRES16=r2, @ANYBLOB="000827bd7000ffdbdf250700000005002d000100000005002e000000000008003c000400000005002a00000000000500300001000000080031001f00000005002f0001000000"], 0x4c}, 0x1, 0x0, 0x0, 0x200080c4}, 0x4000) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r2, 0x100, 0x70bd2b, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x4000040) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 162.675135][T29544] FAULT_INJECTION: forcing a failure. [ 162.675135][T29544] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 162.688653][T29544] CPU: 0 PID: 29544 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 162.698807][T29544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 162.708788][T29544] Call Trace: [ 162.711911][T29544] [ 162.714687][T29544] dump_stack_lvl+0x151/0x1b7 [ 162.719200][T29544] ? io_uring_drop_tctx_refs+0x190/0x190 10:29:21 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, 0x0) [ 162.724668][T29544] ? __update_load_avg_cfs_rq+0xb1/0x2f0 [ 162.730138][T29544] dump_stack+0x15/0x17 [ 162.734131][T29544] should_fail+0x3c6/0x510 [ 162.738384][T29544] should_fail_alloc_page+0x5a/0x80 [ 162.743414][T29544] prepare_alloc_pages+0x15c/0x700 [ 162.748362][T29544] ? __alloc_pages_bulk+0xf50/0xf50 [ 162.753545][T29544] ? sched_clock+0x9/0x10 [ 162.757709][T29544] __alloc_pages+0x138/0x5e0 [ 162.762136][T29544] ? zone_watermark_fast+0x220/0x220 [ 162.767392][T29544] ? is_bpf_text_address+0x172/0x190 [ 162.772508][T29544] pte_alloc_one+0x73/0x1b0 [ 162.776848][T29544] ? pfn_modify_allowed+0x2f0/0x2f0 [ 162.781880][T29544] ? arch_stack_walk+0xf3/0x140 [ 162.786567][T29544] __pte_alloc+0x86/0x350 [ 162.790741][T29544] ? free_pgtables+0x280/0x280 [ 162.795333][T29544] ? _raw_spin_lock+0xa4/0x1b0 [ 162.799933][T29544] ? __kasan_check_write+0x14/0x20 [ 162.804879][T29544] copy_page_range+0x28a8/0x2f90 [ 162.809657][T29544] ? __kasan_slab_alloc+0xb1/0xe0 [ 162.814655][T29544] ? pfn_valid+0x1e0/0x1e0 [ 162.818898][T29544] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 162.824453][T29544] ? __rb_insert_augmented+0x5de/0x610 [ 162.829754][T29544] dup_mm+0xadc/0x12c0 [ 162.833657][T29544] ? copy_init_mm+0x20/0x20 [ 162.837993][T29544] copy_mm+0x107/0x1b0 [ 162.841897][T29544] copy_process+0x12bc/0x3260 [ 162.846412][T29544] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 162.851356][T29544] ? copy_clone_args_from_user+0x744/0x830 [ 162.856998][T29544] kernel_clone+0x21e/0x9e0 [ 162.861338][T29544] ? __delayed_free_task+0x20/0x20 [ 162.866284][T29544] ? vfs_write+0x9ec/0x1110 [ 162.870625][T29544] ? create_io_thread+0x1e0/0x1e0 [ 162.875484][T29544] __x64_sys_clone3+0x376/0x3a0 [ 162.880173][T29544] ? __ia32_sys_clone+0x290/0x290 [ 162.885035][T29544] ? fput+0x1a/0x20 [ 162.888676][T29544] ? debug_smp_processor_id+0x17/0x20 [ 162.893905][T29544] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 162.899803][T29544] ? exit_to_user_mode_prepare+0x39/0xa0 [ 162.905252][T29544] do_syscall_64+0x3d/0xb0 [ 162.909506][T29544] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 162.915233][T29544] RIP: 0033:0x7f52511e2ae9 [ 162.919490][T29544] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 162.938928][T29544] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 162.947172][T29544] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 162.954983][T29544] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 162.962796][T29544] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 10:29:21 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 68) 10:29:21 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000140)=""/213, 0xd5}], 0x3, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:21 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(0x0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/192, 0xc0}, {&(0x7f00000000c0)=""/210, 0xd2}, {&(0x7f00000001c0)=""/236, 0xec}, {&(0x7f00000002c0)=""/76, 0x4c}, {&(0x7f0000000340)=""/73, 0x49}, {&(0x7f00000003c0)=""/17, 0x11}, {&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/130, 0x82}], 0x8, &(0x7f0000001900)=[{&(0x7f0000000580)=""/165, 0xa5}, {&(0x7f0000000640)=""/125, 0x7d}, {&(0x7f00000006c0)=""/136, 0x88}, {&(0x7f0000000780)=""/251, 0xfb}, {&(0x7f0000000880)=""/97, 0x61}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x6, 0x0) 10:29:21 executing program 1: sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x81}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x6}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xba}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x4c001}, 0x4c001) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:21 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) process_vm_readv(0x0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/80, 0x50}, {&(0x7f0000000080)}, {&(0x7f00000000c0)=""/27, 0x1b}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000140)=""/166, 0xa6}, {&(0x7f0000000200)=""/124, 0x7c}, {&(0x7f0000000280)=""/245, 0xf5}, {&(0x7f0000000400)=""/26, 0x1a}, {&(0x7f0000000440)=""/134, 0x86}], 0x5, 0x0) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) process_vm_readv(0x0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/80, 0x50}, {&(0x7f0000000080)}, {&(0x7f00000000c0)=""/27, 0x1b}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000140)=""/166, 0xa6}, {&(0x7f0000000200)=""/124, 0x7c}, {&(0x7f0000000280)=""/245, 0xf5}, {&(0x7f0000000400)=""/26, 0x1a}, {&(0x7f0000000440)=""/134, 0x86}], 0x5, 0x0) (async) 10:29:21 executing program 4: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001080)={'wpan3\x00'}) syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), 0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:21 executing program 3: sendmsg$IEEE802154_ASSOCIATE_RESP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x70, 0x0, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@IEEE802154_ATTR_STATUS={0x5}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_STATUS={0x5, 0x3, 0x1f}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_STATUS={0x5, 0x3, 0x3}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xfffe}]}, 0x70}, 0x1, 0x0, 0x0, 0x40}, 0x0) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:21 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000000140)=""/213, 0xd5}], 0x3, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) [ 162.970608][T29544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 162.978417][T29544] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 162.986234][T29544] 10:29:21 executing program 1: sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x4c001) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:21 executing program 3: sendmsg$IEEE802154_ASSOCIATE_RESP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x70, 0x0, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@IEEE802154_ATTR_STATUS={0x5}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_STATUS={0x5, 0x3, 0x1f}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_STATUS={0x5, 0x3, 0x3}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xfffe}]}, 0x70}, 0x1, 0x0, 0x0, 0x40}, 0x0) (async) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:21 executing program 4: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001080)={'wpan3\x00'}) syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), 0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:21 executing program 4: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001080)={'wpan3\x00'}) syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), 0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) [ 163.020819][T29568] FAULT_INJECTION: forcing a failure. [ 163.020819][T29568] name failslab, interval 1, probability 0, space 0, times 0 [ 163.038892][T29568] CPU: 0 PID: 29568 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 163.049051][T29568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 163.058950][T29568] Call Trace: [ 163.062066][T29568] [ 163.064850][T29568] dump_stack_lvl+0x151/0x1b7 [ 163.069357][T29568] ? io_uring_drop_tctx_refs+0x190/0x190 [ 163.074825][T29568] dump_stack+0x15/0x17 [ 163.078827][T29568] should_fail+0x3c6/0x510 [ 163.083160][T29568] __should_failslab+0xa4/0xe0 [ 163.087848][T29568] ? vm_area_dup+0x26/0x230 [ 163.092194][T29568] should_failslab+0x9/0x20 [ 163.096525][T29568] slab_pre_alloc_hook+0x37/0xd0 [ 163.101298][T29568] ? vm_area_dup+0x26/0x230 [ 163.105637][T29568] kmem_cache_alloc+0x44/0x200 [ 163.110324][T29568] vm_area_dup+0x26/0x230 [ 163.114487][T29568] dup_mm+0x81b/0x12c0 [ 163.118401][T29568] ? copy_init_mm+0x20/0x20 [ 163.122825][T29568] copy_mm+0x107/0x1b0 [ 163.126737][T29568] copy_process+0x12bc/0x3260 [ 163.131239][T29568] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 163.136188][T29568] ? copy_clone_args_from_user+0x744/0x830 [ 163.141824][T29568] kernel_clone+0x21e/0x9e0 [ 163.146253][T29568] ? __delayed_free_task+0x20/0x20 [ 163.151198][T29568] ? vfs_write+0x9ec/0x1110 [ 163.155538][T29568] ? create_io_thread+0x1e0/0x1e0 [ 163.160401][T29568] __x64_sys_clone3+0x376/0x3a0 [ 163.165084][T29568] ? __ia32_sys_clone+0x290/0x290 [ 163.169947][T29568] ? fput+0x1a/0x20 [ 163.173617][T29568] ? debug_smp_processor_id+0x17/0x20 [ 163.178802][T29568] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 163.184699][T29568] ? exit_to_user_mode_prepare+0x39/0xa0 [ 163.190175][T29568] do_syscall_64+0x3d/0xb0 [ 163.194428][T29568] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 163.200148][T29568] RIP: 0033:0x7f52511e2ae9 [ 163.204406][T29568] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 163.223869][T29568] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 163.232174][T29568] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 163.239986][T29568] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 163.247798][T29568] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 163.255608][T29568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 163.263421][T29568] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 10:29:21 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 69) 10:29:21 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) process_vm_readv(0x0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/192, 0xc0}, {&(0x7f00000000c0)=""/210, 0xd2}, {&(0x7f00000001c0)=""/236, 0xec}, {&(0x7f00000002c0)=""/76, 0x4c}, {&(0x7f0000000340)=""/73, 0x49}, {&(0x7f00000003c0)=""/17, 0x11}, {&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/130, 0x82}], 0x8, &(0x7f0000001900)=[{&(0x7f0000000580)=""/165, 0xa5}, {&(0x7f0000000640)=""/125, 0x7d}, {&(0x7f00000006c0)=""/136, 0x88}, {&(0x7f0000000780)=""/251, 0xfb}, {&(0x7f0000000880)=""/97, 0x61}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x6, 0x0) 10:29:21 executing program 4: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001080)={'wpan3\x00'}) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:21 executing program 3: sendmsg$IEEE802154_ASSOCIATE_RESP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x70, 0x0, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@IEEE802154_ATTR_STATUS={0x5}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_STATUS={0x5, 0x3, 0x1f}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_STATUS={0x5, 0x3, 0x3}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xfffe}]}, 0x70}, 0x1, 0x0, 0x0, 0x40}, 0x0) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:21 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {0x0}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:21 executing program 1: sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:21 executing program 1: sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:21 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) process_vm_readv(0x0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/192, 0xc0}, {&(0x7f00000000c0)=""/210, 0xd2}, {&(0x7f00000001c0)=""/236, 0xec}, {&(0x7f00000002c0)=""/76, 0x4c}, {&(0x7f0000000340)=""/73, 0x49}, {&(0x7f00000003c0)=""/17, 0x11}, {&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/130, 0x82}], 0x8, &(0x7f0000001900)=[{&(0x7f0000000580)=""/165, 0xa5}, {&(0x7f0000000640)=""/125, 0x7d}, {&(0x7f00000006c0)=""/136, 0x88}, {&(0x7f0000000780)=""/251, 0xfb}, {&(0x7f0000000880)=""/97, 0x61}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x6, 0x0) 10:29:21 executing program 4: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) [ 163.271232][T29568] 10:29:21 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {0x0}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:21 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x14000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@ipv6_getnexthop={0x50, 0x6a, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@NHA_MASTER={0x8}, @NHA_FDB={0x4}, @NHA_OIF={0x8}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_MASTER={0x8}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x10) r1 = open(&(0x7f0000000080)='./file0\x00', 0x101001, 0x91) r2 = getpid() r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) sendmsg$inet(r3, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000800)="459c36e706b200fad7cb686a7dd376327562641ff9ae408adcbab04e39fcd0dabc3f2c66541c24436ada40250cd88307ff5e68468c8f630dd34e108b79a2ebda7af2a85eacfa249937270253322984777ece050a8bcc2d1f98f05857c48d02eec95de0ab3cae87372b998b6a3d0a0af7303ebdeacec8209c6584094c4f35f9d4a6b7e2761113", 0x86}, {&(0x7f00000008c0)="6c155d52f4e78d7b346bcdd677789bb6af79a09e40e24ab82f048687c538486440b2f14ecd9ebf15b2d4a34cbc70f66f0ab227a579e19b62ee38c1d9351467ed", 0x40}], 0x2, &(0x7f0000000940)=[@ip_retopts={{0x30, 0x0, 0x7, {[@cipso={0x86, 0x1d, 0x3, [{0x2, 0xc, "538382b477b98c54a596"}, {0x2, 0x5, "500edb"}, {0x7, 0x6, "997dc3ae"}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5437}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0x88, 0x1, 0x6, [{@multicast2, 0x1}, {@private=0xa010101, 0x6}, {@broadcast, 0x82}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x7fffffff}, {@multicast2, 0x91}, {@local, 0x1}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x400}}, @ip_retopts={{0x1c, 0x0, 0x7, {[@ra={0x94, 0x4}, @generic={0x94, 0x5, "57dd61"}]}}}], 0xe0}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f00000007c0)={'ip_vti0\x00', &(0x7f0000000740)={'syztnl2\x00', 0x0, 0x700, 0x700, 0x6, 0xdf, {{0xe, 0x4, 0x2, 0x3, 0x38, 0x67, 0x0, 0x1, 0x29, 0x0, @multicast1, @dev={0xac, 0x14, 0x14, 0x21}, {[@generic={0x7, 0x4, ' A'}, @timestamp_addr={0x44, 0xc, 0x3e, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0x11}, 0xc3}]}, @lsrr={0x83, 0xb, 0x81, [@rand_addr=0x64010101, @multicast2]}, @timestamp={0x44, 0x8, 0xd0, 0x0, 0x6, [0x3ff]}]}}}}}) syz_open_procfs$userns(r2, 0x0) process_vm_readv(r2, &(0x7f0000000400)=[{&(0x7f0000000240)=""/43, 0x2b}, {&(0x7f0000000280)=""/151, 0x97}, {&(0x7f0000000340)=""/18, 0x12}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000440)=""/17, 0x11}, {&(0x7f0000000480)=""/76, 0x4c}], 0x2, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x4, 0xb, 0xf, 0x15, 0x5, 0x91, 0x4, 0x145}) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r0) 10:29:21 executing program 5: r0 = getpid() getpgrp(r0) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) r1 = getpid() syz_open_procfs$userns(r1, 0x0) process_vm_readv(r1, 0x0, 0x0, 0x0, 0xffffffffffffff26, 0x0) [ 163.326496][T29598] FAULT_INJECTION: forcing a failure. [ 163.326496][T29598] name failslab, interval 1, probability 0, space 0, times 0 [ 163.348618][T29598] CPU: 0 PID: 29598 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 163.358785][T29598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 163.368678][T29598] Call Trace: [ 163.371802][T29598] [ 163.374572][T29598] dump_stack_lvl+0x151/0x1b7 [ 163.379086][T29598] ? io_uring_drop_tctx_refs+0x190/0x190 [ 163.384552][T29598] dump_stack+0x15/0x17 [ 163.388551][T29598] should_fail+0x3c6/0x510 [ 163.392800][T29598] __should_failslab+0xa4/0xe0 [ 163.397397][T29598] ? anon_vma_clone+0x9a/0x500 [ 163.402000][T29598] should_failslab+0x9/0x20 [ 163.406352][T29598] slab_pre_alloc_hook+0x37/0xd0 [ 163.411736][T29598] ? anon_vma_clone+0x9a/0x500 [ 163.416350][T29598] kmem_cache_alloc+0x44/0x200 [ 163.420934][T29598] anon_vma_clone+0x9a/0x500 [ 163.425567][T29598] anon_vma_fork+0x91/0x4e0 [ 163.429912][T29598] ? anon_vma_name+0x43/0x70 [ 163.434335][T29598] ? vm_area_dup+0x17a/0x230 [ 163.438755][T29598] dup_mm+0x8c5/0x12c0 [ 163.442666][T29598] ? copy_init_mm+0x20/0x20 [ 163.447002][T29598] copy_mm+0x107/0x1b0 [ 163.451947][T29598] copy_process+0x12bc/0x3260 [ 163.456470][T29598] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 163.461407][T29598] ? copy_clone_args_from_user+0x744/0x830 [ 163.467051][T29598] kernel_clone+0x21e/0x9e0 [ 163.471390][T29598] ? __delayed_free_task+0x20/0x20 [ 163.476339][T29598] ? vfs_write+0x9ec/0x1110 [ 163.480679][T29598] ? create_io_thread+0x1e0/0x1e0 [ 163.485542][T29598] __x64_sys_clone3+0x376/0x3a0 [ 163.490228][T29598] ? __ia32_sys_clone+0x290/0x290 [ 163.495085][T29598] ? fput+0x1a/0x20 [ 163.498729][T29598] ? debug_smp_processor_id+0x17/0x20 [ 163.503938][T29598] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 163.509838][T29598] ? exit_to_user_mode_prepare+0x39/0xa0 [ 163.515332][T29598] do_syscall_64+0x3d/0xb0 [ 163.519560][T29598] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 163.525293][T29598] RIP: 0033:0x7f52511e2ae9 [ 163.529540][T29598] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 163.549072][T29598] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 163.557419][T29598] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 163.565217][T29598] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 10:29:22 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 70) 10:29:22 executing program 1: sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0xc240, 0x1b) 10:29:22 executing program 4: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:22 executing program 5: r0 = getpid() getpgrp(r0) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) r1 = getpid() syz_open_procfs$userns(r1, 0x0) process_vm_readv(r1, 0x0, 0x0, 0x0, 0xffffffffffffff26, 0x0) getpid() (async) getpgrp(r0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) (async) getpid() (async) syz_open_procfs$userns(r1, 0x0) (async) process_vm_readv(r1, 0x0, 0x0, 0x0, 0xffffffffffffff26, 0x0) (async) 10:29:22 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x14000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@ipv6_getnexthop={0x50, 0x6a, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@NHA_MASTER={0x8}, @NHA_FDB={0x4}, @NHA_OIF={0x8}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_MASTER={0x8}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x10) (async, rerun: 32) r1 = open(&(0x7f0000000080)='./file0\x00', 0x101001, 0x91) (rerun: 32) r2 = getpid() (async, rerun: 64) r3 = open(0x0, 0x680002, 0x0) (rerun: 64) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) (async) sendmsg$inet(r3, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000800)="459c36e706b200fad7cb686a7dd376327562641ff9ae408adcbab04e39fcd0dabc3f2c66541c24436ada40250cd88307ff5e68468c8f630dd34e108b79a2ebda7af2a85eacfa249937270253322984777ece050a8bcc2d1f98f05857c48d02eec95de0ab3cae87372b998b6a3d0a0af7303ebdeacec8209c6584094c4f35f9d4a6b7e2761113", 0x86}, {&(0x7f00000008c0)="6c155d52f4e78d7b346bcdd677789bb6af79a09e40e24ab82f048687c538486440b2f14ecd9ebf15b2d4a34cbc70f66f0ab227a579e19b62ee38c1d9351467ed", 0x40}], 0x2, &(0x7f0000000940)=[@ip_retopts={{0x30, 0x0, 0x7, {[@cipso={0x86, 0x1d, 0x3, [{0x2, 0xc, "538382b477b98c54a596"}, {0x2, 0x5, "500edb"}, {0x7, 0x6, "997dc3ae"}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5437}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0x88, 0x1, 0x6, [{@multicast2, 0x1}, {@private=0xa010101, 0x6}, {@broadcast, 0x82}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x7fffffff}, {@multicast2, 0x91}, {@local, 0x1}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x400}}, @ip_retopts={{0x1c, 0x0, 0x7, {[@ra={0x94, 0x4}, @generic={0x94, 0x5, "57dd61"}]}}}], 0xe0}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f00000007c0)={'ip_vti0\x00', &(0x7f0000000740)={'syztnl2\x00', 0x0, 0x700, 0x700, 0x6, 0xdf, {{0xe, 0x4, 0x2, 0x3, 0x38, 0x67, 0x0, 0x1, 0x29, 0x0, @multicast1, @dev={0xac, 0x14, 0x14, 0x21}, {[@generic={0x7, 0x4, ' A'}, @timestamp_addr={0x44, 0xc, 0x3e, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0x11}, 0xc3}]}, @lsrr={0x83, 0xb, 0x81, [@rand_addr=0x64010101, @multicast2]}, @timestamp={0x44, 0x8, 0xd0, 0x0, 0x6, [0x3ff]}]}}}}}) (async) syz_open_procfs$userns(r2, 0x0) (async, rerun: 32) process_vm_readv(r2, &(0x7f0000000400)=[{&(0x7f0000000240)=""/43, 0x2b}, {&(0x7f0000000280)=""/151, 0x97}, {&(0x7f0000000340)=""/18, 0x12}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000440)=""/17, 0x11}, {&(0x7f0000000480)=""/76, 0x4c}], 0x2, 0x0) (rerun: 32) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x4, 0xb, 0xf, 0x15, 0x5, 0x91, 0x4, 0x145}) (async) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r0) 10:29:22 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000040)=""/10, 0xa}, {0x0}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) [ 163.573122][T29598] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 163.580932][T29598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 163.588829][T29598] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 163.596645][T29598] 10:29:22 executing program 4: sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000b0) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:22 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x3, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:22 executing program 1: sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0xc240, 0x1b) 10:29:22 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x14000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@ipv6_getnexthop={0x50, 0x6a, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@NHA_MASTER={0x8}, @NHA_FDB={0x4}, @NHA_OIF={0x8}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_MASTER={0x8}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x10) r1 = open(&(0x7f0000000080)='./file0\x00', 0x101001, 0x91) r2 = getpid() r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) (async) sendmsg$inet(r3, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000800)="459c36e706b200fad7cb686a7dd376327562641ff9ae408adcbab04e39fcd0dabc3f2c66541c24436ada40250cd88307ff5e68468c8f630dd34e108b79a2ebda7af2a85eacfa249937270253322984777ece050a8bcc2d1f98f05857c48d02eec95de0ab3cae87372b998b6a3d0a0af7303ebdeacec8209c6584094c4f35f9d4a6b7e2761113", 0x86}, {&(0x7f00000008c0)="6c155d52f4e78d7b346bcdd677789bb6af79a09e40e24ab82f048687c538486440b2f14ecd9ebf15b2d4a34cbc70f66f0ab227a579e19b62ee38c1d9351467ed", 0x40}], 0x2, &(0x7f0000000940)=[@ip_retopts={{0x30, 0x0, 0x7, {[@cipso={0x86, 0x1d, 0x3, [{0x2, 0xc, "538382b477b98c54a596"}, {0x2, 0x5, "500edb"}, {0x7, 0x6, "997dc3ae"}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5437}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0x88, 0x1, 0x6, [{@multicast2, 0x1}, {@private=0xa010101, 0x6}, {@broadcast, 0x82}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x7fffffff}, {@multicast2, 0x91}, {@local, 0x1}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x400}}, @ip_retopts={{0x1c, 0x0, 0x7, {[@ra={0x94, 0x4}, @generic={0x94, 0x5, "57dd61"}]}}}], 0xe0}, 0x4000) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f00000007c0)={'ip_vti0\x00', &(0x7f0000000740)={'syztnl2\x00', 0x0, 0x700, 0x700, 0x6, 0xdf, {{0xe, 0x4, 0x2, 0x3, 0x38, 0x67, 0x0, 0x1, 0x29, 0x0, @multicast1, @dev={0xac, 0x14, 0x14, 0x21}, {[@generic={0x7, 0x4, ' A'}, @timestamp_addr={0x44, 0xc, 0x3e, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0x11}, 0xc3}]}, @lsrr={0x83, 0xb, 0x81, [@rand_addr=0x64010101, @multicast2]}, @timestamp={0x44, 0x8, 0xd0, 0x0, 0x6, [0x3ff]}]}}}}}) syz_open_procfs$userns(r2, 0x0) process_vm_readv(r2, &(0x7f0000000400)=[{&(0x7f0000000240)=""/43, 0x2b}, {&(0x7f0000000280)=""/151, 0x97}, {&(0x7f0000000340)=""/18, 0x12}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000440)=""/17, 0x11}, {&(0x7f0000000480)=""/76, 0x4c}], 0x2, 0x0) (async) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x4, 0xb, 0xf, 0x15, 0x5, 0x91, 0x4, 0x145}) r4 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r0) 10:29:22 executing program 1: sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0xc240, 0x1b) [ 163.622463][T29614] FAULT_INJECTION: forcing a failure. [ 163.622463][T29614] name failslab, interval 1, probability 0, space 0, times 0 [ 163.651523][T29614] CPU: 0 PID: 29614 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 163.661690][T29614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 10:29:22 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40), 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x7}, 0x8) socket$nl_generic(0x10, 0x3, 0x10) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x402a00, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) [ 163.671759][T29614] Call Trace: [ 163.674879][T29614] [ 163.677654][T29614] dump_stack_lvl+0x151/0x1b7 [ 163.682171][T29614] ? io_uring_drop_tctx_refs+0x190/0x190 [ 163.687638][T29614] dump_stack+0x15/0x17 [ 163.691629][T29614] should_fail+0x3c6/0x510 [ 163.695884][T29614] __should_failslab+0xa4/0xe0 [ 163.700483][T29614] ? vm_area_dup+0x26/0x230 [ 163.704824][T29614] should_failslab+0x9/0x20 [ 163.709166][T29614] slab_pre_alloc_hook+0x37/0xd0 [ 163.713935][T29614] ? vm_area_dup+0x26/0x230 [ 163.718273][T29614] kmem_cache_alloc+0x44/0x200 [ 163.722875][T29614] vm_area_dup+0x26/0x230 [ 163.727132][T29614] dup_mm+0x81b/0x12c0 [ 163.731125][T29614] ? copy_init_mm+0x20/0x20 [ 163.735455][T29614] copy_mm+0x107/0x1b0 [ 163.739360][T29614] copy_process+0x12bc/0x3260 [ 163.743876][T29614] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 163.748823][T29614] ? copy_clone_args_from_user+0x744/0x830 [ 163.754460][T29614] kernel_clone+0x21e/0x9e0 [ 163.758802][T29614] ? __delayed_free_task+0x20/0x20 [ 163.763747][T29614] ? vfs_write+0x9ec/0x1110 [ 163.768094][T29614] ? create_io_thread+0x1e0/0x1e0 [ 163.772949][T29614] __x64_sys_clone3+0x376/0x3a0 [ 163.777635][T29614] ? __ia32_sys_clone+0x290/0x290 [ 163.782494][T29614] ? fput+0x1a/0x20 [ 163.786140][T29614] ? debug_smp_processor_id+0x17/0x20 [ 163.791354][T29614] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 163.797250][T29614] ? exit_to_user_mode_prepare+0x39/0xa0 [ 163.802718][T29614] do_syscall_64+0x3d/0xb0 [ 163.806975][T29614] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 163.812699][T29614] RIP: 0033:0x7f52511e2ae9 [ 163.816957][T29614] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 163.836499][T29614] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 163.844864][T29614] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 163.852677][T29614] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 163.860478][T29614] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 10:29:22 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 71) 10:29:22 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x3, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:22 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40), 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x7}, 0x8) socket$nl_generic(0x10, 0x3, 0x10) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x402a00, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40), 0x0, 0x0) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x7}, 0x8) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x402a00, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) (async) 10:29:22 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:22 executing program 1: sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x1b) 10:29:22 executing program 5: r0 = getpid() getpgrp(r0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) r1 = getpid() syz_open_procfs$userns(r1, 0x0) (async) process_vm_readv(r1, 0x0, 0x0, 0x0, 0xffffffffffffff26, 0x0) 10:29:22 executing program 5: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:22 executing program 4: open(0x0, 0xc240, 0x1b) [ 163.868292][T29614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 163.876103][T29614] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 163.883918][T29614] 10:29:22 executing program 4: open(0x0, 0xc240, 0x1b) 10:29:22 executing program 1: sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x1b) 10:29:22 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x3, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:22 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40), 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x7}, 0x8) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x7}, 0x8) socket$nl_generic(0x10, 0x3, 0x10) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x402a00, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) [ 163.921233][T29663] FAULT_INJECTION: forcing a failure. [ 163.921233][T29663] name failslab, interval 1, probability 0, space 0, times 0 [ 163.952369][T29663] CPU: 0 PID: 29663 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 163.963514][T29663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 163.973607][T29663] Call Trace: [ 163.976725][T29663] [ 163.979505][T29663] dump_stack_lvl+0x151/0x1b7 [ 163.984014][T29663] ? io_uring_drop_tctx_refs+0x190/0x190 [ 163.989506][T29663] dump_stack+0x15/0x17 [ 163.993472][T29663] should_fail+0x3c6/0x510 [ 163.997725][T29663] __should_failslab+0xa4/0xe0 [ 164.002344][T29663] ? vm_area_dup+0x26/0x230 [ 164.006761][T29663] should_failslab+0x9/0x20 [ 164.011106][T29663] slab_pre_alloc_hook+0x37/0xd0 [ 164.015876][T29663] ? vm_area_dup+0x26/0x230 [ 164.020201][T29663] kmem_cache_alloc+0x44/0x200 [ 164.024809][T29663] vm_area_dup+0x26/0x230 [ 164.028970][T29663] dup_mm+0x81b/0x12c0 [ 164.032892][T29663] ? copy_init_mm+0x20/0x20 [ 164.037213][T29663] copy_mm+0x107/0x1b0 [ 164.041120][T29663] copy_process+0x12bc/0x3260 [ 164.045635][T29663] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 164.050580][T29663] ? copy_clone_args_from_user+0x744/0x830 [ 164.056219][T29663] kernel_clone+0x21e/0x9e0 [ 164.060559][T29663] ? __delayed_free_task+0x20/0x20 [ 164.065515][T29663] ? vfs_write+0x9ec/0x1110 [ 164.069856][T29663] ? create_io_thread+0x1e0/0x1e0 [ 164.074707][T29663] __x64_sys_clone3+0x376/0x3a0 [ 164.079393][T29663] ? __ia32_sys_clone+0x290/0x290 [ 164.084254][T29663] ? fput+0x1a/0x20 [ 164.087900][T29663] ? debug_smp_processor_id+0x17/0x20 [ 164.093194][T29663] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 164.099190][T29663] ? exit_to_user_mode_prepare+0x39/0xa0 [ 164.104649][T29663] do_syscall_64+0x3d/0xb0 [ 164.108905][T29663] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 164.114633][T29663] RIP: 0033:0x7f52511e2ae9 [ 164.118890][T29663] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 164.138326][T29663] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 164.146570][T29663] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 164.154383][T29663] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 164.162191][T29663] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 10:29:22 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 72) 10:29:22 executing program 5: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:22 executing program 3: r0 = getpid() syz_open_procfs$userns(r0, 0x0) ptrace$ARCH_SHSTK_ENABLE(0x1e, r0, 0x2, 0x5001) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:22 executing program 4: open(0x0, 0xc240, 0x1b) 10:29:22 executing program 1: sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x1b) 10:29:22 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:22 executing program 5: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) (async) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:22 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x3, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:22 executing program 3: r0 = getpid() syz_open_procfs$userns(r0, 0x0) ptrace$ARCH_SHSTK_ENABLE(0x1e, r0, 0x2, 0x5001) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) [ 164.170044][T29663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 164.177817][T29663] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 164.185629][T29663] 10:29:22 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x1b) 10:29:22 executing program 1: sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x0) 10:29:22 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x3, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) [ 164.270087][T29694] FAULT_INJECTION: forcing a failure. [ 164.270087][T29694] name failslab, interval 1, probability 0, space 0, times 0 [ 164.285739][T29694] CPU: 0 PID: 29694 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 164.295897][T29694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 164.305796][T29694] Call Trace: [ 164.308912][T29694] [ 164.311685][T29694] dump_stack_lvl+0x151/0x1b7 [ 164.316203][T29694] ? io_uring_drop_tctx_refs+0x190/0x190 [ 164.321669][T29694] dump_stack+0x15/0x17 [ 164.325659][T29694] should_fail+0x3c6/0x510 [ 164.329915][T29694] __should_failslab+0xa4/0xe0 [ 164.334514][T29694] ? anon_vma_fork+0x1df/0x4e0 [ 164.339110][T29694] should_failslab+0x9/0x20 [ 164.343451][T29694] slab_pre_alloc_hook+0x37/0xd0 [ 164.348225][T29694] ? anon_vma_fork+0x1df/0x4e0 [ 164.352827][T29694] kmem_cache_alloc+0x44/0x200 [ 164.357426][T29694] anon_vma_fork+0x1df/0x4e0 [ 164.361859][T29694] dup_mm+0x8c5/0x12c0 [ 164.365758][T29694] ? copy_init_mm+0x20/0x20 [ 164.370097][T29694] copy_mm+0x107/0x1b0 [ 164.374002][T29694] copy_process+0x12bc/0x3260 [ 164.378517][T29694] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 164.383463][T29694] ? copy_clone_args_from_user+0x744/0x830 [ 164.389113][T29694] kernel_clone+0x21e/0x9e0 [ 164.393444][T29694] ? __delayed_free_task+0x20/0x20 [ 164.398393][T29694] ? vfs_write+0x9ec/0x1110 [ 164.402739][T29694] ? create_io_thread+0x1e0/0x1e0 [ 164.407591][T29694] __x64_sys_clone3+0x376/0x3a0 [ 164.412299][T29694] ? __ia32_sys_clone+0x290/0x290 [ 164.417140][T29694] ? fput+0x1a/0x20 [ 164.420784][T29694] ? debug_smp_processor_id+0x17/0x20 [ 164.425990][T29694] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 164.431892][T29694] ? exit_to_user_mode_prepare+0x39/0xa0 [ 164.437449][T29694] do_syscall_64+0x3d/0xb0 [ 164.441700][T29694] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 164.447524][T29694] RIP: 0033:0x7f52511e2ae9 [ 164.451785][T29694] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 164.471241][T29694] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 164.479460][T29694] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 164.487279][T29694] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 164.495084][T29694] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 164.503179][T29694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 164.511244][T29694] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 10:29:23 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 73) 10:29:23 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x1b) 10:29:23 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) syz_clone3(&(0x7f0000000240)={0x40000800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0, {0x10}, &(0x7f00000000c0)=""/38, 0x26, &(0x7f0000000100)=""/231, &(0x7f0000000200)=[r0, r0], 0x2}, 0x58) process_vm_readv(r2, 0x0, 0x0, 0x0, 0xfffffef7, 0x0) 10:29:23 executing program 3: r0 = getpid() syz_open_procfs$userns(r0, 0x0) ptrace$ARCH_SHSTK_ENABLE(0x1e, r0, 0x2, 0x5001) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:23 executing program 1: sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x0) 10:29:23 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x3, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:23 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) syz_clone3(&(0x7f0000000240)={0x40000800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0, {0x10}, &(0x7f00000000c0)=""/38, 0x26, &(0x7f0000000100)=""/231, &(0x7f0000000200)=[r0, r0], 0x2}, 0x58) process_vm_readv(r2, 0x0, 0x0, 0x0, 0xfffffef7, 0x0) getpid() (async) syz_open_procfs$userns(r0, 0x0) (async) getpid() (async) syz_open_procfs$userns(r1, 0x0) (async) syz_clone3(&(0x7f0000000240)={0x40000800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/38, 0x26, &(0x7f0000000100)=""/231, &(0x7f0000000200)=[r0, r0], 0x2}, 0x58) (async) process_vm_readv(r2, 0x0, 0x0, 0x0, 0xfffffef7, 0x0) (async) 10:29:23 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:23 executing program 1: sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x0) [ 164.519063][T29694] 10:29:23 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) process_vm_readv(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000000)=""/113, 0x71}, {&(0x7f0000000080)=""/12, 0xc}, {&(0x7f00000000c0)=""/130, 0x82}, {&(0x7f0000000180)=""/141, 0x8d}, {&(0x7f0000000240)=""/104, 0x68}, {&(0x7f0000000400)=""/236, 0xec}, {&(0x7f00000002c0)=""/192, 0xc0}], 0x7, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/69, 0x45}, {&(0x7f0000000600)=""/90, 0x5a}, {&(0x7f0000000680)=""/253, 0xfd}, {&(0x7f0000000780)=""/141, 0x8d}, {&(0x7f0000000840)=""/78, 0x4e}, {&(0x7f00000008c0)=""/222, 0xde}], 0x6, 0x0) [ 164.555059][T29713] FAULT_INJECTION: forcing a failure. [ 164.555059][T29713] name failslab, interval 1, probability 0, space 0, times 0 [ 164.568216][T29713] CPU: 1 PID: 29713 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 164.578372][T29713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 164.588267][T29713] Call Trace: [ 164.591396][T29713] [ 164.594170][T29713] dump_stack_lvl+0x151/0x1b7 [ 164.598681][T29713] ? io_uring_drop_tctx_refs+0x190/0x190 10:29:23 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:23 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x1b) [ 164.604151][T29713] ? avc_denied+0x1b0/0x1b0 [ 164.608490][T29713] dump_stack+0x15/0x17 [ 164.612480][T29713] should_fail+0x3c6/0x510 [ 164.616730][T29713] __should_failslab+0xa4/0xe0 [ 164.621332][T29713] ? vm_area_dup+0x26/0x230 [ 164.625684][T29713] should_failslab+0x9/0x20 [ 164.630013][T29713] slab_pre_alloc_hook+0x37/0xd0 [ 164.634789][T29713] ? vm_area_dup+0x26/0x230 [ 164.639125][T29713] kmem_cache_alloc+0x44/0x200 [ 164.643739][T29713] vm_area_dup+0x26/0x230 [ 164.647894][T29713] dup_mm+0x81b/0x12c0 [ 164.651793][T29713] ? copy_init_mm+0x20/0x20 [ 164.656139][T29713] copy_mm+0x107/0x1b0 [ 164.660036][T29713] copy_process+0x12bc/0x3260 [ 164.664672][T29713] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 164.669589][T29713] ? copy_clone_args_from_user+0x744/0x830 [ 164.675224][T29713] kernel_clone+0x21e/0x9e0 [ 164.679561][T29713] ? __delayed_free_task+0x20/0x20 [ 164.684707][T29713] ? vfs_write+0x9ec/0x1110 [ 164.689024][T29713] ? create_io_thread+0x1e0/0x1e0 [ 164.693883][T29713] __x64_sys_clone3+0x376/0x3a0 [ 164.698573][T29713] ? __ia32_sys_clone+0x290/0x290 [ 164.703430][T29713] ? fput+0x1a/0x20 [ 164.707260][T29713] ? debug_smp_processor_id+0x17/0x20 [ 164.712475][T29713] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 164.718368][T29713] ? exit_to_user_mode_prepare+0x39/0xa0 [ 164.723834][T29713] do_syscall_64+0x3d/0xb0 [ 164.728086][T29713] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 164.733813][T29713] RIP: 0033:0x7f52511e2ae9 [ 164.738071][T29713] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 164.757514][T29713] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 164.765753][T29713] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 164.773565][T29713] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 164.781386][T29713] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 164.789191][T29713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 164.797085][T29713] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 10:29:23 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 74) 10:29:23 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) process_vm_readv(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000000)=""/113, 0x71}, {&(0x7f0000000080)=""/12, 0xc}, {&(0x7f00000000c0)=""/130, 0x82}, {&(0x7f0000000180)=""/141, 0x8d}, {&(0x7f0000000240)=""/104, 0x68}, {&(0x7f0000000400)=""/236, 0xec}, {&(0x7f00000002c0)=""/192, 0xc0}], 0x7, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/69, 0x45}, {&(0x7f0000000600)=""/90, 0x5a}, {&(0x7f0000000680)=""/253, 0xfd}, {&(0x7f0000000780)=""/141, 0x8d}, {&(0x7f0000000840)=""/78, 0x4e}, {&(0x7f00000008c0)=""/222, 0xde}], 0x6, 0x0) 10:29:23 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x0) 10:29:23 executing program 1: sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x4c001) open(&(0x7f0000000140)='./file0\x00', 0xc240, 0x1b) 10:29:23 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:23 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) syz_clone3(&(0x7f0000000240)={0x40000800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/38, 0x26, &(0x7f0000000100)=""/231, &(0x7f0000000200)=[r0, r0], 0x2}, 0x58) (async) syz_clone3(&(0x7f0000000240)={0x40000800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0, {0x10}, &(0x7f00000000c0)=""/38, 0x26, &(0x7f0000000100)=""/231, &(0x7f0000000200)=[r0, r0], 0x2}, 0x58) process_vm_readv(r2, 0x0, 0x0, 0x0, 0xfffffef7, 0x0) (async) process_vm_readv(r2, 0x0, 0x0, 0x0, 0xfffffef7, 0x0) [ 164.805082][T29713] 10:29:23 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) process_vm_readv(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000000)=""/113, 0x71}, {&(0x7f0000000080)=""/12, 0xc}, {&(0x7f00000000c0)=""/130, 0x82}, {&(0x7f0000000180)=""/141, 0x8d}, {&(0x7f0000000240)=""/104, 0x68}, {&(0x7f0000000400)=""/236, 0xec}, {&(0x7f00000002c0)=""/192, 0xc0}], 0x7, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/69, 0x45}, {&(0x7f0000000600)=""/90, 0x5a}, {&(0x7f0000000680)=""/253, 0xfd}, {&(0x7f0000000780)=""/141, 0x8d}, {&(0x7f0000000840)=""/78, 0x4e}, {&(0x7f00000008c0)=""/222, 0xde}], 0x6, 0x0) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) process_vm_readv(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000000)=""/113, 0x71}, {&(0x7f0000000080)=""/12, 0xc}, {&(0x7f00000000c0)=""/130, 0x82}, {&(0x7f0000000180)=""/141, 0x8d}, {&(0x7f0000000240)=""/104, 0x68}, {&(0x7f0000000400)=""/236, 0xec}, {&(0x7f00000002c0)=""/192, 0xc0}], 0x7, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/69, 0x45}, {&(0x7f0000000600)=""/90, 0x5a}, {&(0x7f0000000680)=""/253, 0xfd}, {&(0x7f0000000780)=""/141, 0x8d}, {&(0x7f0000000840)=""/78, 0x4e}, {&(0x7f00000008c0)=""/222, 0xde}], 0x6, 0x0) (async) 10:29:23 executing program 4: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x10fb40, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x6, 0xa, "ee066bba82f97eee18d6"}) prctl$PR_GET_TIMERSLACK(0x1e) 10:29:23 executing program 1: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x10fb40, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x6, 0xa, "ee066bba82f97eee18d6"}) prctl$PR_GET_TIMERSLACK(0x1e) 10:29:23 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) process_vm_readv(0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/194, 0xc2}, {&(0x7f0000000100)=""/104, 0x68}], 0x2, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/183, 0xb7}], 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x2080, 0x0) syz_open_dev$loop(&(0x7f00000002c0), 0x7ff, 0x40) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000300), r0) [ 164.830076][T29740] FAULT_INJECTION: forcing a failure. [ 164.830076][T29740] name failslab, interval 1, probability 0, space 0, times 0 [ 164.842818][T29740] CPU: 1 PID: 29740 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 164.852970][T29740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 164.862866][T29740] Call Trace: [ 164.865992][T29740] [ 164.868768][T29740] dump_stack_lvl+0x151/0x1b7 [ 164.873282][T29740] ? io_uring_drop_tctx_refs+0x190/0x190 10:29:23 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, 0x0, 0x0, 0x0) 10:29:23 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) process_vm_readv(0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/194, 0xc2}, {&(0x7f0000000100)=""/104, 0x68}], 0x2, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/183, 0xb7}], 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x2080, 0x0) syz_open_dev$loop(&(0x7f00000002c0), 0x7ff, 0x40) (async) syz_open_dev$loop(&(0x7f00000002c0), 0x7ff, 0x40) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000300), r0) (async) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000300), r0) [ 164.878748][T29740] ? avc_denied+0x1b0/0x1b0 [ 164.883087][T29740] dump_stack+0x15/0x17 [ 164.887078][T29740] should_fail+0x3c6/0x510 [ 164.891333][T29740] __should_failslab+0xa4/0xe0 [ 164.895930][T29740] ? vm_area_dup+0x26/0x230 [ 164.900269][T29740] should_failslab+0x9/0x20 [ 164.904609][T29740] slab_pre_alloc_hook+0x37/0xd0 [ 164.909384][T29740] ? vm_area_dup+0x26/0x230 [ 164.913728][T29740] kmem_cache_alloc+0x44/0x200 [ 164.918331][T29740] vm_area_dup+0x26/0x230 [ 164.922490][T29740] dup_mm+0x81b/0x12c0 [ 164.926399][T29740] ? copy_init_mm+0x20/0x20 [ 164.930739][T29740] copy_mm+0x107/0x1b0 [ 164.934657][T29740] copy_process+0x12bc/0x3260 [ 164.939158][T29740] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 164.944099][T29740] ? copy_clone_args_from_user+0x744/0x830 [ 164.949745][T29740] kernel_clone+0x21e/0x9e0 [ 164.954081][T29740] ? __delayed_free_task+0x20/0x20 [ 164.959029][T29740] ? vfs_write+0x9ec/0x1110 [ 164.963369][T29740] ? create_io_thread+0x1e0/0x1e0 [ 164.968227][T29740] __x64_sys_clone3+0x376/0x3a0 [ 164.972911][T29740] ? __ia32_sys_clone+0x290/0x290 [ 164.977773][T29740] ? fput+0x1a/0x20 [ 164.981417][T29740] ? debug_smp_processor_id+0x17/0x20 [ 164.986624][T29740] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 164.992525][T29740] ? exit_to_user_mode_prepare+0x39/0xa0 [ 164.997993][T29740] do_syscall_64+0x3d/0xb0 [ 165.002246][T29740] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 165.007974][T29740] RIP: 0033:0x7f52511e2ae9 [ 165.012231][T29740] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 165.031668][T29740] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 165.039913][T29740] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 165.047723][T29740] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 165.055621][T29740] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 165.063433][T29740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 165.071245][T29740] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 10:29:23 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 75) 10:29:23 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) process_vm_readv(0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/194, 0xc2}, {&(0x7f0000000100)=""/104, 0x68}], 0x2, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/183, 0xb7}], 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x2080, 0x0) syz_open_dev$loop(&(0x7f00000002c0), 0x7ff, 0x40) (async) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000300), r0) 10:29:23 executing program 4: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x10fb40, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x6, 0xa, "ee066bba82f97eee18d6"}) prctl$PR_GET_TIMERSLACK(0x1e) 10:29:23 executing program 1: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x10fb40, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x6, 0xa, "ee066bba82f97eee18d6"}) prctl$PR_GET_TIMERSLACK(0x1e) 10:29:23 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, 0x0, 0x0, 0x0) 10:29:23 executing program 5: r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48800}, 0x24008080) r2 = syz_open_dev$vcsu(&(0x7f0000000000), 0x3, 0x80) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000040)=0x7) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:23 executing program 4: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x10fb40, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x6, 0xa, "ee066bba82f97eee18d6"}) prctl$PR_GET_TIMERSLACK(0x1e) 10:29:23 executing program 5: r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48800}, 0x24008080) (async) r2 = syz_open_dev$vcsu(&(0x7f0000000000), 0x3, 0x80) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000040)=0x7) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:23 executing program 1: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x10fb40, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x6, 0xa, "ee066bba82f97eee18d6"}) prctl$PR_GET_TIMERSLACK(0x1e) 10:29:23 executing program 3: r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) [ 165.079060][T29740] 10:29:23 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, 0x0, 0x0, 0x0) 10:29:23 executing program 5: r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48800}, 0x24008080) (async, rerun: 64) r2 = syz_open_dev$vcsu(&(0x7f0000000000), 0x3, 0x80) (rerun: 64) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000040)=0x7) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 165.132893][T29774] FAULT_INJECTION: forcing a failure. [ 165.132893][T29774] name failslab, interval 1, probability 0, space 0, times 0 [ 165.150784][T29774] CPU: 1 PID: 29774 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 165.160944][T29774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 165.170839][T29774] Call Trace: [ 165.173960][T29774] [ 165.176748][T29774] dump_stack_lvl+0x151/0x1b7 [ 165.181247][T29774] ? io_uring_drop_tctx_refs+0x190/0x190 [ 165.186716][T29774] dump_stack+0x15/0x17 [ 165.190705][T29774] should_fail+0x3c6/0x510 [ 165.194959][T29774] __should_failslab+0xa4/0xe0 [ 165.199559][T29774] ? vm_area_dup+0x26/0x230 [ 165.203900][T29774] should_failslab+0x9/0x20 [ 165.208239][T29774] slab_pre_alloc_hook+0x37/0xd0 [ 165.213013][T29774] ? vm_area_dup+0x26/0x230 [ 165.217351][T29774] kmem_cache_alloc+0x44/0x200 [ 165.221953][T29774] vm_area_dup+0x26/0x230 [ 165.226116][T29774] dup_mm+0x81b/0x12c0 [ 165.230025][T29774] ? copy_init_mm+0x20/0x20 [ 165.234363][T29774] copy_mm+0x107/0x1b0 [ 165.238268][T29774] copy_process+0x12bc/0x3260 [ 165.242790][T29774] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 165.247731][T29774] ? copy_clone_args_from_user+0x744/0x830 [ 165.253372][T29774] kernel_clone+0x21e/0x9e0 [ 165.257710][T29774] ? __delayed_free_task+0x20/0x20 [ 165.262658][T29774] ? vfs_write+0x9ec/0x1110 [ 165.266998][T29774] ? create_io_thread+0x1e0/0x1e0 [ 165.271857][T29774] __x64_sys_clone3+0x376/0x3a0 [ 165.276543][T29774] ? __ia32_sys_clone+0x290/0x290 [ 165.281406][T29774] ? fput+0x1a/0x20 [ 165.285048][T29774] ? debug_smp_processor_id+0x17/0x20 [ 165.290257][T29774] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 165.296159][T29774] ? exit_to_user_mode_prepare+0x39/0xa0 [ 165.301628][T29774] do_syscall_64+0x3d/0xb0 [ 165.305879][T29774] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 165.311609][T29774] RIP: 0033:0x7f52511e2ae9 [ 165.315860][T29774] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 165.335305][T29774] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 165.343546][T29774] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 165.351358][T29774] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 165.359170][T29774] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 165.366979][T29774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 165.374792][T29774] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 10:29:23 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 76) 10:29:23 executing program 4: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x10fb40, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) 10:29:23 executing program 5: sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="08002dbd7000ffdbdf250100000008000300", @ANYRES32=0x0, @ANYBLOB="0800010003000000"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x200c4810) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:23 executing program 3: r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) (async) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:23 executing program 1: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x10fb40, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x6, 0xa, "ee066bba82f97eee18d6"}) 10:29:23 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) [ 165.382605][T29774] 10:29:23 executing program 4: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) 10:29:23 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:23 executing program 5: sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="08002dbd7000ffdbdf250100000008000300", @ANYRES32=0x0, @ANYBLOB="0800010003000000"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x200c4810) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="08002dbd7000ffdbdf250100000008000300", @ANYRES32=0x0, @ANYBLOB="0800010003000000"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x200c4810) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 10:29:23 executing program 3: r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) open(0x0, 0x680002, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) (async) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) 10:29:23 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:23 executing program 4: prctl$PR_GET_TIMERSLACK(0x1e) [ 165.413596][T29800] FAULT_INJECTION: forcing a failure. [ 165.413596][T29800] name failslab, interval 1, probability 0, space 0, times 0 [ 165.441324][T29800] CPU: 1 PID: 29800 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 165.451568][T29800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 165.461485][T29800] Call Trace: [ 165.464590][T29800] [ 165.467368][T29800] dump_stack_lvl+0x151/0x1b7 [ 165.471877][T29800] ? io_uring_drop_tctx_refs+0x190/0x190 [ 165.477349][T29800] dump_stack+0x15/0x17 [ 165.481340][T29800] should_fail+0x3c6/0x510 [ 165.485592][T29800] __should_failslab+0xa4/0xe0 [ 165.490193][T29800] ? anon_vma_clone+0x9a/0x500 [ 165.494790][T29800] should_failslab+0x9/0x20 [ 165.499135][T29800] slab_pre_alloc_hook+0x37/0xd0 [ 165.503904][T29800] ? anon_vma_clone+0x9a/0x500 [ 165.508520][T29800] kmem_cache_alloc+0x44/0x200 [ 165.513101][T29800] anon_vma_clone+0x9a/0x500 [ 165.517529][T29800] anon_vma_fork+0x91/0x4e0 [ 165.521865][T29800] ? anon_vma_name+0x43/0x70 [ 165.526291][T29800] ? vm_area_dup+0x17a/0x230 [ 165.530729][T29800] dup_mm+0x8c5/0x12c0 [ 165.534626][T29800] ? copy_init_mm+0x20/0x20 [ 165.538968][T29800] copy_mm+0x107/0x1b0 [ 165.542884][T29800] copy_process+0x12bc/0x3260 [ 165.547383][T29800] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 165.552328][T29800] ? copy_clone_args_from_user+0x744/0x830 [ 165.557977][T29800] kernel_clone+0x21e/0x9e0 [ 165.562313][T29800] ? __delayed_free_task+0x20/0x20 [ 165.567256][T29800] ? vfs_write+0x9ec/0x1110 [ 165.571596][T29800] ? create_io_thread+0x1e0/0x1e0 [ 165.576459][T29800] __x64_sys_clone3+0x376/0x3a0 [ 165.581145][T29800] ? __ia32_sys_clone+0x290/0x290 [ 165.586006][T29800] ? fput+0x1a/0x20 [ 165.589651][T29800] ? debug_smp_processor_id+0x17/0x20 [ 165.594858][T29800] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 165.600762][T29800] ? exit_to_user_mode_prepare+0x39/0xa0 [ 165.606236][T29800] do_syscall_64+0x3d/0xb0 [ 165.610482][T29800] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 165.616209][T29800] RIP: 0033:0x7f52511e2ae9 [ 165.620472][T29800] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 165.639905][T29800] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 165.648150][T29800] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 165.656081][T29800] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 10:29:24 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 77) 10:29:24 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:24 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {0x0}], 0x4, 0x0) 10:29:24 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), 0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x32) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r2, 0x0, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7ff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x4000000) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r2, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000c}, 0xc810) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3e47}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7fff}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x4}]}, 0x54}}, 0x4001000) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r0, 0x0, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7ff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x4000000) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="27764e15", @ANYRES16=r0, @ANYBLOB="000329bd7000fedbdf2506000000050035002000000005002f0000000000"], 0x24}, 0x1, 0x0, 0x0, 0x80000}, 0x2004c001) 10:29:24 executing program 1: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x10fb40, 0x0) 10:29:24 executing program 5: sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="08002dbd7000ffdbdf250100000008000300", @ANYRES32=0x0, @ANYBLOB="0800010003000000"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x200c4810) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:24 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:24 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), 0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x32) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r2, 0x0, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7ff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x4000000) (async) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r2, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000c}, 0xc810) (async) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3e47}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7fff}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x4}]}, 0x54}}, 0x4001000) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r0, 0x0, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7ff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x4000000) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="27764e15", @ANYRES16=r0, @ANYBLOB="000329bd7000fedbdf2506000000050035002000000005002f0000000000"], 0x24}, 0x1, 0x0, 0x0, 0x80000}, 0x2004c001) [ 165.663890][T29800] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 165.671702][T29800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 165.679515][T29800] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 165.687329][T29800] 10:29:24 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x10fb40, 0x0) 10:29:24 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {0x0}], 0x4, 0x0) 10:29:24 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) [ 165.728411][T29831] FAULT_INJECTION: forcing a failure. [ 165.728411][T29831] name failslab, interval 1, probability 0, space 0, times 0 [ 165.753233][T29831] CPU: 1 PID: 29831 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 165.763389][T29831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 165.773287][T29831] Call Trace: 10:29:24 executing program 1: openat$urandom(0xffffffffffffff9c, 0x0, 0x10fb40, 0x0) [ 165.776409][T29831] [ 165.779183][T29831] dump_stack_lvl+0x151/0x1b7 [ 165.783713][T29831] ? io_uring_drop_tctx_refs+0x190/0x190 [ 165.789169][T29831] dump_stack+0x15/0x17 [ 165.793160][T29831] should_fail+0x3c6/0x510 [ 165.797411][T29831] __should_failslab+0xa4/0xe0 [ 165.802013][T29831] ? anon_vma_clone+0x9a/0x500 [ 165.806615][T29831] should_failslab+0x9/0x20 [ 165.810952][T29831] slab_pre_alloc_hook+0x37/0xd0 [ 165.815724][T29831] ? anon_vma_clone+0x9a/0x500 [ 165.820325][T29831] kmem_cache_alloc+0x44/0x200 [ 165.824927][T29831] anon_vma_clone+0x9a/0x500 [ 165.829351][T29831] anon_vma_fork+0x91/0x4e0 [ 165.833700][T29831] ? anon_vma_name+0x43/0x70 [ 165.838111][T29831] ? vm_area_dup+0x17a/0x230 [ 165.842557][T29831] dup_mm+0x8c5/0x12c0 [ 165.846534][T29831] ? copy_init_mm+0x20/0x20 [ 165.850870][T29831] copy_mm+0x107/0x1b0 [ 165.854776][T29831] copy_process+0x12bc/0x3260 [ 165.859290][T29831] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 165.864236][T29831] ? copy_clone_args_from_user+0x744/0x830 [ 165.869878][T29831] kernel_clone+0x21e/0x9e0 [ 165.874214][T29831] ? __delayed_free_task+0x20/0x20 [ 165.879165][T29831] ? vfs_write+0x9ec/0x1110 [ 165.883503][T29831] ? create_io_thread+0x1e0/0x1e0 [ 165.888366][T29831] __x64_sys_clone3+0x376/0x3a0 [ 165.893052][T29831] ? __ia32_sys_clone+0x290/0x290 [ 165.897914][T29831] ? fput+0x1a/0x20 [ 165.901563][T29831] ? debug_smp_processor_id+0x17/0x20 [ 165.906765][T29831] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 165.912666][T29831] ? exit_to_user_mode_prepare+0x39/0xa0 [ 165.918131][T29831] do_syscall_64+0x3d/0xb0 [ 165.922388][T29831] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 165.928114][T29831] RIP: 0033:0x7f52511e2ae9 [ 165.932368][T29831] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 165.951807][T29831] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 165.960489][T29831] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 165.968298][T29831] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 10:29:24 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 78) 10:29:24 executing program 5: r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r0, 0x1f, 0x1, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) r1 = getpid() process_vm_readv(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:24 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}, {0x0}], 0x4, 0x0) 10:29:24 executing program 1: openat$urandom(0xffffffffffffff9c, 0x0, 0x10fb40, 0x0) 10:29:24 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) process_vm_readv(0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:24 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), 0xffffffffffffffff) (async) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x32) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r2, 0x0, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7ff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x4000000) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r2, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000c}, 0xc810) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3e47}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7fff}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x4}]}, 0x54}}, 0x4001000) (async) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r0, 0x0, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7ff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x4000000) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="27764e15", @ANYRES16=r0, @ANYBLOB="000329bd7000fedbdf2506000000050035002000000005002f0000000000"], 0x24}, 0x1, 0x0, 0x0, 0x80000}, 0x2004c001) 10:29:24 executing program 5: r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r0, 0x1f, 0x1, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) r1 = getpid() process_vm_readv(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 165.976108][T29831] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 165.983923][T29831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 165.991734][T29831] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 165.999549][T29831] 10:29:24 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f00000015c0)=""/96, 0x60}], 0x3, 0x0) 10:29:24 executing program 3: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) r1 = getpid() socket$igmp6(0xa, 0x3, 0x2) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0xa2) syz_open_procfs$userns(r1, 0x0) process_vm_readv(r1, &(0x7f0000000400)=[{&(0x7f0000000100)=""/248, 0xf8}, {&(0x7f0000000200)=""/166, 0xa6}, {&(0x7f00000002c0)=""/5, 0x5}, {&(0x7f0000000300)=""/230, 0xe6}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000500)=""/17, 0x11}], 0x1, 0x0) r3 = getpid() syz_open_procfs$userns(r3, 0x0) ptrace$peeksig(0x4209, r3, &(0x7f0000000780)={0xffffffffffffffff, 0x1, 0x8}, &(0x7f0000000cc0)=[{}, {}, {}, {}, {}, {}, {}, {}]) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0) 10:29:24 executing program 1: openat$urandom(0xffffffffffffff9c, 0x0, 0x10fb40, 0x0) 10:29:24 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) [ 166.031869][T29858] FAULT_INJECTION: forcing a failure. [ 166.031869][T29858] name failslab, interval 1, probability 0, space 0, times 0 [ 166.047727][T29858] CPU: 1 PID: 29858 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 166.057884][T29858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 166.067787][T29858] Call Trace: [ 166.070904][T29858] [ 166.073680][T29858] dump_stack_lvl+0x151/0x1b7 10:29:24 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) [ 166.078192][T29858] ? io_uring_drop_tctx_refs+0x190/0x190 [ 166.083683][T29858] dump_stack+0x15/0x17 [ 166.087650][T29858] should_fail+0x3c6/0x510 [ 166.091908][T29858] __should_failslab+0xa4/0xe0 [ 166.096504][T29858] ? anon_vma_fork+0x1df/0x4e0 [ 166.101102][T29858] should_failslab+0x9/0x20 [ 166.105449][T29858] slab_pre_alloc_hook+0x37/0xd0 [ 166.110220][T29858] ? anon_vma_fork+0x1df/0x4e0 [ 166.114819][T29858] kmem_cache_alloc+0x44/0x200 [ 166.119421][T29858] anon_vma_fork+0x1df/0x4e0 [ 166.123842][T29858] dup_mm+0x8c5/0x12c0 [ 166.127746][T29858] ? copy_init_mm+0x20/0x20 [ 166.132082][T29858] copy_mm+0x107/0x1b0 [ 166.135990][T29858] copy_process+0x12bc/0x3260 [ 166.140511][T29858] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 166.145450][T29858] ? copy_clone_args_from_user+0x744/0x830 [ 166.151097][T29858] kernel_clone+0x21e/0x9e0 [ 166.155444][T29858] ? __delayed_free_task+0x20/0x20 [ 166.160378][T29858] ? vfs_write+0x9ec/0x1110 [ 166.164717][T29858] ? create_io_thread+0x1e0/0x1e0 [ 166.169584][T29858] __x64_sys_clone3+0x376/0x3a0 [ 166.174262][T29858] ? __ia32_sys_clone+0x290/0x290 [ 166.179124][T29858] ? fput+0x1a/0x20 [ 166.182790][T29858] ? debug_smp_processor_id+0x17/0x20 [ 166.187978][T29858] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 166.193877][T29858] ? exit_to_user_mode_prepare+0x39/0xa0 [ 166.199350][T29858] do_syscall_64+0x3d/0xb0 [ 166.203773][T29858] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 166.209502][T29858] RIP: 0033:0x7f52511e2ae9 [ 166.213756][T29858] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 166.233195][T29858] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 166.241440][T29858] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 166.249254][T29858] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 166.257066][T29858] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 166.264875][T29858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 166.272685][T29858] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 166.280511][T29858] [ 166.292821][T29858] ================================================================== [ 166.300707][T29858] BUG: KASAN: use-after-free in vm_area_free_no_check+0x7e/0x130 [ 166.308251][T29858] Write of size 4 at addr ffff88812f901058 by task syz-executor.2/29858 [ 166.316407][T29858] [ 166.318582][T29858] CPU: 1 PID: 29858 Comm: syz-executor.2 Not tainted 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 166.328736][T29858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 166.338628][T29858] Call Trace: [ 166.341751][T29858] [ 166.344531][T29858] dump_stack_lvl+0x151/0x1b7 [ 166.349045][T29858] ? io_uring_drop_tctx_refs+0x190/0x190 [ 166.354512][T29858] ? panic+0x751/0x751 [ 166.358415][T29858] ? slab_free_freelist_hook+0xbd/0x190 [ 166.363797][T29858] print_address_description+0x87/0x3b0 [ 166.369178][T29858] kasan_report+0x179/0x1c0 [ 166.373516][T29858] ? vm_area_free_no_check+0x7e/0x130 [ 166.378727][T29858] ? vm_area_free_no_check+0x7e/0x130 [ 166.383934][T29858] kasan_check_range+0x293/0x2a0 [ 166.388706][T29858] __kasan_check_write+0x14/0x20 [ 166.393479][T29858] vm_area_free_no_check+0x7e/0x130 [ 166.398516][T29858] dup_mm+0xd73/0x12c0 [ 166.402420][T29858] ? copy_init_mm+0x20/0x20 [ 166.406760][T29858] copy_mm+0x107/0x1b0 [ 166.410663][T29858] copy_process+0x12bc/0x3260 [ 166.415196][T29858] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 166.420124][T29858] ? copy_clone_args_from_user+0x744/0x830 [ 166.425767][T29858] kernel_clone+0x21e/0x9e0 [ 166.430106][T29858] ? __delayed_free_task+0x20/0x20 [ 166.435054][T29858] ? vfs_write+0x9ec/0x1110 [ 166.439399][T29858] ? create_io_thread+0x1e0/0x1e0 [ 166.444255][T29858] __x64_sys_clone3+0x376/0x3a0 [ 166.448939][T29858] ? __ia32_sys_clone+0x290/0x290 [ 166.453802][T29858] ? fput+0x1a/0x20 [ 166.457446][T29858] ? debug_smp_processor_id+0x17/0x20 [ 166.462654][T29858] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 166.468556][T29858] ? exit_to_user_mode_prepare+0x39/0xa0 [ 166.474019][T29858] do_syscall_64+0x3d/0xb0 [ 166.478284][T29858] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 166.484005][T29858] RIP: 0033:0x7f52511e2ae9 [ 166.488257][T29858] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 166.507697][T29858] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 166.515954][T29858] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 166.523755][T29858] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 166.531564][T29858] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 166.539387][T29858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 166.547190][T29858] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 166.555003][T29858] [ 166.557865][T29858] [ 166.560032][T29858] Allocated by task 29831: [ 166.564285][T29858] __kasan_slab_alloc+0xb1/0xe0 [ 166.568971][T29858] slab_post_alloc_hook+0x53/0x2c0 [ 166.573919][T29858] kmem_cache_alloc+0xf5/0x200 [ 166.578522][T29858] vm_area_dup+0x26/0x230 [ 166.582684][T29858] dup_mm+0x81b/0x12c0 [ 166.586589][T29858] copy_mm+0x107/0x1b0 [ 166.590501][T29858] copy_process+0x12bc/0x3260 [ 166.595009][T29858] kernel_clone+0x21e/0x9e0 [ 166.599349][T29858] __x64_sys_clone3+0x376/0x3a0 [ 166.604035][T29858] do_syscall_64+0x3d/0xb0 [ 166.608288][T29858] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 166.614015][T29858] [ 166.616187][T29858] Freed by task 13: [ 166.619834][T29858] kasan_set_track+0x4b/0x70 [ 166.624258][T29858] kasan_set_free_info+0x23/0x40 [ 166.629033][T29858] ____kasan_slab_free+0x126/0x160 [ 166.633988][T29858] __kasan_slab_free+0x11/0x20 [ 166.638578][T29858] slab_free_freelist_hook+0xbd/0x190 [ 166.643786][T29858] kmem_cache_free+0x116/0x2e0 [ 166.648385][T29858] __free_vm_area_struct+0x1c/0x20 [ 166.653335][T29858] rcu_do_batch+0x57a/0xc10 [ 166.657674][T29858] rcu_core+0x517/0x1020 [ 166.661750][T29858] rcu_core_si+0x9/0x10 [ 166.665841][T29858] __do_softirq+0x26d/0x5bf [ 166.670172][T29858] [ 166.672339][T29858] Last potentially related work creation: [ 166.677894][T29858] kasan_save_stack+0x3b/0x60 [ 166.682409][T29858] __kasan_record_aux_stack+0xd3/0xf0 [ 166.687615][T29858] kasan_record_aux_stack_noalloc+0xb/0x10 [ 166.693428][T29858] call_rcu+0x133/0x12a0 [ 166.697514][T29858] vm_area_free_no_check+0xff/0x130 [ 166.702542][T29858] vm_area_free+0x53/0x60 [ 166.706710][T29858] exit_mmap+0x50d/0x6f0 [ 166.710787][T29858] __mmput+0x95/0x310 [ 166.714605][T29858] mmput+0x5b/0x170 [ 166.718255][T29858] do_exit+0xbb4/0x2b60 [ 166.722250][T29858] __ia32_sys_exit+0x0/0x40 [ 166.726584][T29858] do_syscall_64+0x3d/0xb0 [ 166.730934][T29858] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 166.736695][T29858] [ 166.738824][T29858] Second to last potentially related work creation: [ 166.745246][T29858] kasan_save_stack+0x3b/0x60 [ 166.749757][T29858] __kasan_record_aux_stack+0xd3/0xf0 [ 166.754974][T29858] kasan_record_aux_stack_noalloc+0xb/0x10 [ 166.760607][T29858] call_rcu+0x133/0x12a0 [ 166.764687][T29858] vm_area_free_no_check+0xff/0x130 [ 166.769721][T29858] vm_area_free+0x53/0x60 [ 166.773886][T29858] exit_mmap+0x50d/0x6f0 [ 166.777968][T29858] __mmput+0x95/0x310 [ 166.781795][T29858] mmput+0x5b/0x170 [ 166.785430][T29858] do_exit+0xbb4/0x2b60 [ 166.789424][T29858] do_group_exit+0x141/0x310 [ 166.793847][T29858] get_signal+0x7a3/0x1630 [ 166.798102][T29858] arch_do_signal_or_restart+0xbd/0x1680 [ 166.803571][T29858] exit_to_user_mode_loop+0xa0/0xe0 [ 166.808601][T29858] exit_to_user_mode_prepare+0x5a/0xa0 [ 166.813897][T29858] syscall_exit_to_user_mode+0x26/0x160 [ 166.819277][T29858] do_syscall_64+0x49/0xb0 [ 166.823532][T29858] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 166.829348][T29858] [ 166.831515][T29858] The buggy address belongs to the object at ffff88812f901000 [ 166.831515][T29858] which belongs to the cache vm_area_struct of size 232 [ 166.845662][T29858] The buggy address is located 88 bytes inside of [ 166.845662][T29858] 232-byte region [ffff88812f901000, ffff88812f9010e8) [ 166.858682][T29858] The buggy address belongs to the page: [ 166.864151][T29858] page:ffffea0004be4040 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12f901 [ 166.874221][T29858] flags: 0x4000000000000200(slab|zone=1) [ 166.879690][T29858] raw: 4000000000000200 dead000000000100 dead000000000122 ffff8881001b5e00 [ 166.888114][T29858] raw: 0000000000000000 00000000000d000d 00000001ffffffff 0000000000000000 [ 166.896524][T29858] page dumped because: kasan: bad access detected [ 166.902775][T29858] page_owner tracks the page as allocated [ 166.908430][T29858] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 4348, ts 54977394562, free_ts 54797282890 [ 166.924213][T29858] post_alloc_hook+0x1a3/0x1b0 [ 166.928809][T29858] get_page_from_freelist+0x2ed2/0x2f90 [ 166.934191][T29858] __alloc_pages+0x206/0x5e0 [ 166.938632][T29858] new_slab+0x9a/0x4e0 [ 166.942522][T29858] ___slab_alloc+0x39e/0x830 [ 166.946946][T29858] __slab_alloc+0x4a/0x90 [ 166.951112][T29858] kmem_cache_alloc+0x134/0x200 [ 166.955801][T29858] vm_area_dup+0x26/0x230 [ 166.959966][T29858] dup_mm+0x81b/0x12c0 [ 166.963871][T29858] copy_mm+0x107/0x1b0 [ 166.967777][T29858] copy_process+0x12bc/0x3260 [ 166.972290][T29858] kernel_clone+0x21e/0x9e0 [ 166.976643][T29858] __x64_sys_clone3+0x376/0x3a0 [ 166.981318][T29858] do_syscall_64+0x3d/0xb0 [ 166.985571][T29858] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 166.991311][T29858] page last free stack trace: [ 166.995814][T29858] free_unref_page_prepare+0x7c8/0x7d0 [ 167.001279][T29858] free_unref_page_list+0x14b/0xa60 [ 167.006313][T29858] release_pages+0x1310/0x1370 [ 167.010912][T29858] free_pages_and_swap_cache+0x8a/0xa0 [ 167.016206][T29858] tlb_finish_mmu+0x177/0x320 [ 167.020726][T29858] exit_mmap+0x3ef/0x6f0 [ 167.024800][T29858] __mmput+0x95/0x310 [ 167.028704][T29858] mmput+0x5b/0x170 [ 167.032360][T29858] copy_process+0x2766/0x3260 [ 167.036866][T29858] kernel_clone+0x21e/0x9e0 [ 167.041204][T29858] __x64_sys_clone3+0x376/0x3a0 [ 167.045890][T29858] do_syscall_64+0x3d/0xb0 [ 167.050144][T29858] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 167.055871][T29858] [ 167.058039][T29858] Memory state around the buggy address: [ 167.063512][T29858] ffff88812f900f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 167.071411][T29858] ffff88812f900f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 10:29:25 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 79) 10:29:25 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 10:29:25 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) process_vm_readv(0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:25 executing program 5: r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) (async, rerun: 64) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r0, 0x1f, 0x1, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) (async, rerun: 64) r1 = getpid() process_vm_readv(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:25 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f00000015c0)=""/96, 0x60}], 0x3, 0x0) 10:29:25 executing program 3: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) r1 = getpid() socket$igmp6(0xa, 0x3, 0x2) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0xa2) (async) syz_open_procfs$userns(r1, 0x0) process_vm_readv(r1, &(0x7f0000000400)=[{&(0x7f0000000100)=""/248, 0xf8}, {&(0x7f0000000200)=""/166, 0xa6}, {&(0x7f00000002c0)=""/5, 0x5}, {&(0x7f0000000300)=""/230, 0xe6}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000500)=""/17, 0x11}], 0x1, 0x0) r3 = getpid() syz_open_procfs$userns(r3, 0x0) (async, rerun: 64) ptrace$peeksig(0x4209, r3, &(0x7f0000000780)={0xffffffffffffffff, 0x1, 0x8}, &(0x7f0000000cc0)=[{}, {}, {}, {}, {}, {}, {}, {}]) (rerun: 64) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0) 10:29:25 executing program 3: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) (async) r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) (async) r1 = getpid() (async) socket$igmp6(0xa, 0x3, 0x2) (async) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0xa2) (async) syz_open_procfs$userns(r1, 0x0) (async) process_vm_readv(r1, &(0x7f0000000400)=[{&(0x7f0000000100)=""/248, 0xf8}, {&(0x7f0000000200)=""/166, 0xa6}, {&(0x7f00000002c0)=""/5, 0x5}, {&(0x7f0000000300)=""/230, 0xe6}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000500)=""/17, 0x11}], 0x1, 0x0) (async) r3 = getpid() syz_open_procfs$userns(r3, 0x0) (async) ptrace$peeksig(0x4209, r3, &(0x7f0000000780)={0xffffffffffffffff, 0x1, 0x8}, &(0x7f0000000cc0)=[{}, {}, {}, {}, {}, {}, {}, {}]) (async) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0) 10:29:25 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) process_vm_readv(0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:25 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0xee, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/319], &(0x7f00000000c0)={0x1, 0x4, [0xac4, 0x8b5, 0x7c7, 0xb12]}) [ 167.079310][T29858] >ffff88812f901000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 167.087206][T29858] ^ [ 167.093975][T29858] ffff88812f901080: fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc [ 167.101874][T29858] ffff88812f901100: fc fc fc fc fc fa fb fb fb fb fb fb fb fb fb fb [ 167.109768][T29858] ================================================================== [ 167.117666][T29858] Disabling lock debugging due to kernel taint 10:29:25 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) r1 = getpid() socket$igmp6(0xa, 0x3, 0x2) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0xa2) syz_open_procfs$userns(r1, 0x0) process_vm_readv(r1, &(0x7f0000000400)=[{&(0x7f0000000100)=""/248, 0xf8}, {&(0x7f0000000200)=""/166, 0xa6}, {&(0x7f00000002c0)=""/5, 0x5}, {&(0x7f0000000300)=""/230, 0xe6}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000500)=""/17, 0x11}], 0x1, 0x0) r3 = getpid() syz_open_procfs$userns(r3, 0x0) ptrace$peeksig(0x4209, r3, &(0x7f0000000780)={0xffffffffffffffff, 0x1, 0x8}, &(0x7f0000000cc0)=[{}, {}, {}, {}, {}, {}, {}, {}]) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0) 10:29:25 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f00000015c0)=""/96, 0x60}], 0x3, 0x0) [ 167.181783][T29893] FAULT_INJECTION: forcing a failure. [ 167.181783][T29893] name failslab, interval 1, probability 0, space 0, times 0 [ 167.194874][T29893] CPU: 1 PID: 29893 Comm: syz-executor.2 Tainted: G B 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 167.206417][T29893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 167.216312][T29893] Call Trace: [ 167.219438][T29893] [ 167.222211][T29893] dump_stack_lvl+0x151/0x1b7 10:29:25 executing program 3: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000000)) [ 167.226725][T29893] ? io_uring_drop_tctx_refs+0x190/0x190 [ 167.232192][T29893] dump_stack+0x15/0x17 [ 167.236184][T29893] should_fail+0x3c6/0x510 [ 167.240441][T29893] __should_failslab+0xa4/0xe0 [ 167.245038][T29893] ? anon_vma_fork+0x1df/0x4e0 [ 167.249638][T29893] should_failslab+0x9/0x20 [ 167.253982][T29893] slab_pre_alloc_hook+0x37/0xd0 [ 167.258751][T29893] ? anon_vma_fork+0x1df/0x4e0 [ 167.263350][T29893] kmem_cache_alloc+0x44/0x200 [ 167.267951][T29893] anon_vma_fork+0x1df/0x4e0 [ 167.272373][T29893] dup_mm+0x8c5/0x12c0 [ 167.276276][T29893] ? copy_init_mm+0x20/0x20 [ 167.280617][T29893] copy_mm+0x107/0x1b0 [ 167.284523][T29893] copy_process+0x12bc/0x3260 [ 167.289037][T29893] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 167.293982][T29893] ? copy_clone_args_from_user+0x744/0x830 [ 167.299648][T29893] kernel_clone+0x21e/0x9e0 [ 167.303966][T29893] ? __delayed_free_task+0x20/0x20 [ 167.308909][T29893] ? vfs_write+0x9ec/0x1110 [ 167.313292][T29893] ? create_io_thread+0x1e0/0x1e0 [ 167.318111][T29893] __x64_sys_clone3+0x376/0x3a0 [ 167.322797][T29893] ? __ia32_sys_clone+0x290/0x290 [ 167.327662][T29893] ? fput+0x1a/0x20 [ 167.331302][T29893] ? debug_smp_processor_id+0x17/0x20 [ 167.336514][T29893] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 167.342416][T29893] ? exit_to_user_mode_prepare+0x39/0xa0 [ 167.347881][T29893] do_syscall_64+0x3d/0xb0 [ 167.352137][T29893] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 167.357867][T29893] RIP: 0033:0x7f52511e2ae9 [ 167.362114][T29893] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 10:29:25 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 80) 10:29:25 executing program 4: r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:25 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) r1 = getpid() socket$igmp6(0xa, 0x3, 0x2) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0xa2) syz_open_procfs$userns(r1, 0x0) process_vm_readv(r1, &(0x7f0000000400)=[{&(0x7f0000000100)=""/248, 0xf8}, {&(0x7f0000000200)=""/166, 0xa6}, {&(0x7f00000002c0)=""/5, 0x5}, {&(0x7f0000000300)=""/230, 0xe6}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000500)=""/17, 0x11}], 0x1, 0x0) r3 = getpid() syz_open_procfs$userns(r3, 0x0) ptrace$peeksig(0x4209, r3, &(0x7f0000000780)={0xffffffffffffffff, 0x1, 0x8}, &(0x7f0000000cc0)=[{}, {}, {}, {}, {}, {}, {}, {}]) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0) 10:29:25 executing program 3: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000000)) 10:29:25 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:25 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0xee, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/319], &(0x7f00000000c0)={0x1, 0x4, [0xac4, 0x8b5, 0x7c7, 0xb12]}) (async) syz_emit_ethernet(0xee, &(0x7f0000000200)=ANY=[@ANYBLOB="fa3976442122bbbbbbbbbbbb81004d000011d47eb7bc2c1c0e40e95f7c1ae160aa043460c959f7907163bf01f4a2b30d2f6d88687aca2055f62e41be90a517a2d604f80812f5ab5d8555795fa1d94cdb561324607ce0fc5e3105a150ed15d295ad148e7d67deacb3b8ce630ad7467f1f1c0ba5c515926536fe85a24b902ec645451657be0d6665f3e99b0b3c85405c687956f26993c3c29cbfd0644d7a4aa544f2601acef819c517d025bc35cabd9c5c488a38fc60ba902cbaa6defeba4d85427300d44a6cf07bb40dcf9797bf0fb7aeb07d627097265b1c90f93c1674a885333d97157fbdcd3897754703accf2fda6dd79e25e32a5ba310f92224b739e87b29760d4801d8e00cc104a68f822dab276c7da07915f794e0adb39013a5017ee0819a5ece58424155618f20ca67e7bf0e42677000"/319], &(0x7f00000000c0)={0x1, 0x4, [0xac4, 0x8b5, 0x7c7, 0xb12]}) 10:29:25 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0xee, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/319], &(0x7f00000000c0)={0x1, 0x4, [0xac4, 0x8b5, 0x7c7, 0xb12]}) 10:29:25 executing program 4: r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:25 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x3, 0x0) [ 167.381556][T29893] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 167.389972][T29893] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 167.397782][T29893] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 167.405593][T29893] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 167.413406][T29893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 167.421216][T29893] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 167.429032][T29893] 10:29:25 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:26 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) r1 = getpid() socket$igmp6(0xa, 0x3, 0x2) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0xa2) syz_open_procfs$userns(r1, 0x0) process_vm_readv(r1, &(0x7f0000000400)=[{&(0x7f0000000100)=""/248, 0xf8}, {&(0x7f0000000200)=""/166, 0xa6}, {&(0x7f00000002c0)=""/5, 0x5}, {&(0x7f0000000300)=""/230, 0xe6}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000500)=""/17, 0x11}], 0x1, 0x0) r3 = getpid() syz_open_procfs$userns(r3, 0x0) ptrace$peeksig(0x4209, r3, &(0x7f0000000780)={0xffffffffffffffff, 0x1, 0x8}, &(0x7f0000000cc0)=[{}, {}, {}, {}, {}, {}, {}, {}]) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0) [ 167.468900][T29922] FAULT_INJECTION: forcing a failure. [ 167.468900][T29922] name failslab, interval 1, probability 0, space 0, times 0 [ 167.486117][T29922] CPU: 0 PID: 29922 Comm: syz-executor.2 Tainted: G B 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 167.497667][T29922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 167.507564][T29922] Call Trace: [ 167.510681][T29922] [ 167.513467][T29922] dump_stack_lvl+0x151/0x1b7 10:29:26 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) r1 = getpid() socket$igmp6(0xa, 0x3, 0x2) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0xa2) syz_open_procfs$userns(r1, 0x0) process_vm_readv(r1, &(0x7f0000000400)=[{&(0x7f0000000100)=""/248, 0xf8}, {&(0x7f0000000200)=""/166, 0xa6}, {&(0x7f00000002c0)=""/5, 0x5}, {&(0x7f0000000300)=""/230, 0xe6}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000500)=""/17, 0x11}], 0x1, 0x0) r3 = getpid() syz_open_procfs$userns(r3, 0x0) ptrace$peeksig(0x4209, r3, &(0x7f0000000780)={0xffffffffffffffff, 0x1, 0x8}, &(0x7f0000000cc0)=[{}, {}, {}, {}, {}, {}, {}, {}]) [ 167.517980][T29922] ? io_uring_drop_tctx_refs+0x190/0x190 [ 167.523452][T29922] ? avc_denied+0x1b0/0x1b0 [ 167.527782][T29922] dump_stack+0x15/0x17 [ 167.531772][T29922] should_fail+0x3c6/0x510 [ 167.536024][T29922] __should_failslab+0xa4/0xe0 [ 167.540630][T29922] ? vm_area_dup+0x26/0x230 [ 167.544969][T29922] should_failslab+0x9/0x20 [ 167.549308][T29922] slab_pre_alloc_hook+0x37/0xd0 [ 167.554082][T29922] ? vm_area_dup+0x26/0x230 [ 167.558422][T29922] kmem_cache_alloc+0x44/0x200 [ 167.563029][T29922] vm_area_dup+0x26/0x230 [ 167.567187][T29922] dup_mm+0x81b/0x12c0 [ 167.571095][T29922] ? copy_init_mm+0x20/0x20 [ 167.575457][T29922] copy_mm+0x107/0x1b0 [ 167.579340][T29922] copy_process+0x12bc/0x3260 [ 167.583854][T29922] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 167.588792][T29922] ? copy_clone_args_from_user+0x744/0x830 [ 167.594432][T29922] kernel_clone+0x21e/0x9e0 [ 167.598786][T29922] ? __delayed_free_task+0x20/0x20 [ 167.603734][T29922] ? vfs_write+0x9ec/0x1110 [ 167.608060][T29922] ? create_io_thread+0x1e0/0x1e0 [ 167.612921][T29922] __x64_sys_clone3+0x376/0x3a0 [ 167.617606][T29922] ? __ia32_sys_clone+0x290/0x290 [ 167.622470][T29922] ? fput+0x1a/0x20 [ 167.626114][T29922] ? debug_smp_processor_id+0x17/0x20 [ 167.631320][T29922] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 167.637220][T29922] ? exit_to_user_mode_prepare+0x39/0xa0 [ 167.642690][T29922] do_syscall_64+0x3d/0xb0 [ 167.646943][T29922] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 167.652668][T29922] RIP: 0033:0x7f52511e2ae9 [ 167.656924][T29922] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 167.676376][T29922] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 167.684611][T29922] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 167.692445][T29922] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 167.700236][T29922] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 167.708043][T29922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:29:26 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 81) 10:29:26 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) r1 = getpid() socket$igmp6(0xa, 0x3, 0x2) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0xa2) syz_open_procfs$userns(r1, 0x0) process_vm_readv(r1, &(0x7f0000000400)=[{&(0x7f0000000100)=""/248, 0xf8}, {&(0x7f0000000200)=""/166, 0xa6}, {&(0x7f00000002c0)=""/5, 0x5}, {&(0x7f0000000300)=""/230, 0xe6}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000500)=""/17, 0x11}], 0x1, 0x0) r3 = getpid() syz_open_procfs$userns(r3, 0x0) 10:29:26 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x3, 0x0) 10:29:26 executing program 3: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000000)) 10:29:26 executing program 4: r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:26 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 10:29:26 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x3, 0x0) 10:29:26 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) r1 = getpid() socket$igmp6(0xa, 0x3, 0x2) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0xa2) syz_open_procfs$userns(r1, 0x0) process_vm_readv(r1, &(0x7f0000000400)=[{&(0x7f0000000100)=""/248, 0xf8}, {&(0x7f0000000200)=""/166, 0xa6}, {&(0x7f00000002c0)=""/5, 0x5}, {&(0x7f0000000300)=""/230, 0xe6}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000500)=""/17, 0x11}], 0x1, 0x0) getpid() 10:29:26 executing program 4: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) [ 167.715855][T29922] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 167.723671][T29922] 10:29:26 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 10:29:26 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {0x0}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:26 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000003c0), 0xffffffffffffffff) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001500)={0xffffffffffffffff, 0x6, 0x8, 0x401}) r5 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) r6 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000540)) r7 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000000540)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001640)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001540)={0x80, r1, 0x300, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3007}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xd7e6}, @NBD_ATTR_SOCKETS={0x54, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r8}, {0x8, 0x1, r3}, {0x8}, {0x8}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040090) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000400)={{0x0, 0x5, 0x40, 0x3, 0x2, 0x27, 0x100000001, 0x1cc8, 0x78, 0x7ff, 0x10001, 0x4, 0x3, 0x200, 0xffffffffffff50aa}}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001880)={{r9, 0x14, 0x4, 0xd9e6, 0xd866, 0x5, 0x8001, 0x8, 0x4, 0x2, 0x1, 0x8, 0x4, 0x18000000000}}) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/69, 0x45}, {0x0}, {&(0x7f0000000040)=""/184, 0xb8}, {&(0x7f0000000100)=""/32, 0x20}], 0x4, 0x0) process_vm_readv(0x0, &(0x7f0000000180)=[{&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000000)=""/53, 0x35}], 0x2, &(0x7f0000000340)=[{&(0x7f0000001400)=""/224, 0xe0}], 0x1, 0x0) [ 167.773302][T29946] FAULT_INJECTION: forcing a failure. [ 167.773302][T29946] name failslab, interval 1, probability 0, space 0, times 0 [ 167.799231][T29946] CPU: 1 PID: 29946 Comm: syz-executor.2 Tainted: G B 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 167.810781][T29946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 167.820682][T29946] Call Trace: [ 167.823799][T29946] [ 167.826578][T29946] dump_stack_lvl+0x151/0x1b7 [ 167.831194][T29946] ? io_uring_drop_tctx_refs+0x190/0x190 [ 167.836661][T29946] ? avc_denied+0x1b0/0x1b0 [ 167.841003][T29946] dump_stack+0x15/0x17 [ 167.844983][T29946] should_fail+0x3c6/0x510 [ 167.849236][T29946] __should_failslab+0xa4/0xe0 [ 167.853835][T29946] ? vm_area_dup+0x26/0x230 [ 167.858177][T29946] should_failslab+0x9/0x20 [ 167.862517][T29946] slab_pre_alloc_hook+0x37/0xd0 [ 167.867291][T29946] ? vm_area_dup+0x26/0x230 [ 167.871631][T29946] kmem_cache_alloc+0x44/0x200 [ 167.876229][T29946] vm_area_dup+0x26/0x230 [ 167.880394][T29946] dup_mm+0x81b/0x12c0 [ 167.884301][T29946] ? copy_init_mm+0x20/0x20 [ 167.888637][T29946] copy_mm+0x107/0x1b0 [ 167.892542][T29946] copy_process+0x12bc/0x3260 [ 167.897058][T29946] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 167.902004][T29946] ? copy_clone_args_from_user+0x744/0x830 [ 167.907645][T29946] kernel_clone+0x21e/0x9e0 [ 167.911987][T29946] ? __delayed_free_task+0x20/0x20 [ 167.916932][T29946] ? vfs_write+0x9ec/0x1110 [ 167.921271][T29946] ? create_io_thread+0x1e0/0x1e0 [ 167.926139][T29946] __x64_sys_clone3+0x376/0x3a0 [ 167.930818][T29946] ? __ia32_sys_clone+0x290/0x290 [ 167.935683][T29946] ? fput+0x1a/0x20 [ 167.939323][T29946] ? debug_smp_processor_id+0x17/0x20 [ 167.944534][T29946] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 167.950434][T29946] ? exit_to_user_mode_prepare+0x39/0xa0 [ 167.955902][T29946] do_syscall_64+0x3d/0xb0 [ 167.960157][T29946] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 167.965884][T29946] RIP: 0033:0x7f52511e2ae9 [ 167.970138][T29946] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 167.989578][T29946] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 167.997820][T29946] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 168.005631][T29946] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 168.013443][T29946] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 10:29:26 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 82) 10:29:26 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) getpid() r1 = getpid() syz_open_procfs$userns(r1, 0x0) r2 = syz_clone3(&(0x7f0000000280)={0x2080100, &(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0, {0x31}, &(0x7f0000000180)=""/17, 0x11, &(0x7f00000001c0)=""/128, &(0x7f0000000240)=[0x0, 0xffffffffffffffff, r1], 0x3}, 0x58) r5 = getpid() syz_open_procfs$userns(r5, 0x0) r6 = syz_clone3(&(0x7f00000005c0)={0x8810cf6c95950af, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), {0x18}, &(0x7f0000000740)=""/200, 0xc8, &(0x7f0000000480)=""/212, &(0x7f0000000580)=[r0, r5, r0, r3, r1, r2, r5, r3], 0x8}, 0x58) getpid() r7 = getpid() syz_open_procfs$userns(r7, 0x0) syz_clone3(&(0x7f00000006c0)={0x20a1000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0, {0x17}, &(0x7f00000011c0)=""/4110, 0x100e, &(0x7f00000010c0)=""/28, &(0x7f0000000680)=[r5, r1, r3, r5, r4, r6, r1, r0, r7], 0x9}, 0x58) process_vm_readv(r8, 0x0, 0xffffffffffffff68, 0x0, 0x0, 0x0) 10:29:26 executing program 4: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:26 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) r1 = getpid() socket$igmp6(0xa, 0x3, 0x2) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0xa2) syz_open_procfs$userns(r1, 0x0) process_vm_readv(r1, &(0x7f0000000400)=[{&(0x7f0000000100)=""/248, 0xf8}, {&(0x7f0000000200)=""/166, 0xa6}, {&(0x7f00000002c0)=""/5, 0x5}, {&(0x7f0000000300)=""/230, 0xe6}], 0x4, &(0x7f0000000480)=[{&(0x7f0000000500)=""/17, 0x11}], 0x1, 0x0) 10:29:26 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {0x0}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:26 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000003c0), 0xffffffffffffffff) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) (async) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001500)={0xffffffffffffffff, 0x6, 0x8, 0x401}) (async, rerun: 64) r5 = open(0x0, 0x680002, 0x0) (async, rerun: 64) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) r6 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000540)) (async) r7 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000000540)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001640)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001540)={0x80, r1, 0x300, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3007}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xd7e6}, @NBD_ATTR_SOCKETS={0x54, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r8}, {0x8, 0x1, r3}, {0x8}, {0x8}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040090) (async, rerun: 32) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000400)={{0x0, 0x5, 0x40, 0x3, 0x2, 0x27, 0x100000001, 0x1cc8, 0x78, 0x7ff, 0x10001, 0x4, 0x3, 0x200, 0xffffffffffff50aa}}) (rerun: 32) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001880)={{r9, 0x14, 0x4, 0xd9e6, 0xd866, 0x5, 0x8001, 0x8, 0x4, 0x2, 0x1, 0x8, 0x4, 0x18000000000}}) (async) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/69, 0x45}, {0x0}, {&(0x7f0000000040)=""/184, 0xb8}, {&(0x7f0000000100)=""/32, 0x20}], 0x4, 0x0) process_vm_readv(0x0, &(0x7f0000000180)=[{&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000000)=""/53, 0x35}], 0x2, &(0x7f0000000340)=[{&(0x7f0000001400)=""/224, 0xe0}], 0x1, 0x0) 10:29:26 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000003c0), 0xffffffffffffffff) (async) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) r3 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001500)={0xffffffffffffffff, 0x6, 0x8, 0x401}) (async) r5 = open(0x0, 0x680002, 0x0) (async, rerun: 32) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)) (async, rerun: 32) r6 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000540)) r7 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000000540)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001640)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001540)={0x80, r1, 0x300, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3007}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xd7e6}, @NBD_ATTR_SOCKETS={0x54, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r8}, {0x8, 0x1, r3}, {0x8}, {0x8}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040090) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000400)={{0x0, 0x5, 0x40, 0x3, 0x2, 0x27, 0x100000001, 0x1cc8, 0x78, 0x7ff, 0x10001, 0x4, 0x3, 0x200, 0xffffffffffff50aa}}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001880)={{r9, 0x14, 0x4, 0xd9e6, 0xd866, 0x5, 0x8001, 0x8, 0x4, 0x2, 0x1, 0x8, 0x4, 0x18000000000}}) (async) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/69, 0x45}, {0x0}, {&(0x7f0000000040)=""/184, 0xb8}, {&(0x7f0000000100)=""/32, 0x20}], 0x4, 0x0) (async) process_vm_readv(0x0, &(0x7f0000000180)=[{&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000000)=""/53, 0x35}], 0x2, &(0x7f0000000340)=[{&(0x7f0000001400)=""/224, 0xe0}], 0x1, 0x0) 10:29:26 executing program 4: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) [ 168.021258][T29946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 168.029064][T29946] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 168.036882][T29946] 10:29:26 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) r1 = getpid() socket$igmp6(0xa, 0x3, 0x2) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0xa2) syz_open_procfs$userns(r1, 0x0) 10:29:26 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {0x0}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:26 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) getpid() socket$igmp6(0xa, 0x3, 0x2) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0xa2) 10:29:26 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40), 0x0, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) [ 168.078444][T29971] FAULT_INJECTION: forcing a failure. [ 168.078444][T29971] name failslab, interval 1, probability 0, space 0, times 0 [ 168.118974][T29971] CPU: 0 PID: 29971 Comm: syz-executor.2 Tainted: G B 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 168.130616][T29971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 168.140510][T29971] Call Trace: [ 168.143631][T29971] [ 168.146409][T29971] dump_stack_lvl+0x151/0x1b7 [ 168.150926][T29971] ? io_uring_drop_tctx_refs+0x190/0x190 [ 168.156393][T29971] dump_stack+0x15/0x17 [ 168.160382][T29971] should_fail+0x3c6/0x510 [ 168.164634][T29971] __should_failslab+0xa4/0xe0 [ 168.169235][T29971] ? anon_vma_clone+0x9a/0x500 [ 168.173830][T29971] should_failslab+0x9/0x20 [ 168.178166][T29971] slab_pre_alloc_hook+0x37/0xd0 [ 168.182946][T29971] ? anon_vma_clone+0x9a/0x500 [ 168.187716][T29971] kmem_cache_alloc+0x44/0x200 [ 168.192316][T29971] anon_vma_clone+0x9a/0x500 [ 168.196740][T29971] anon_vma_fork+0x91/0x4e0 [ 168.201081][T29971] ? anon_vma_name+0x4c/0x70 [ 168.205507][T29971] ? vm_area_dup+0x17a/0x230 [ 168.209931][T29971] dup_mm+0x8c5/0x12c0 [ 168.213839][T29971] ? copy_init_mm+0x20/0x20 [ 168.218177][T29971] copy_mm+0x107/0x1b0 [ 168.222083][T29971] copy_process+0x12bc/0x3260 [ 168.226598][T29971] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 168.231544][T29971] ? copy_clone_args_from_user+0x744/0x830 [ 168.237187][T29971] kernel_clone+0x21e/0x9e0 [ 168.241536][T29971] ? __delayed_free_task+0x20/0x20 [ 168.246473][T29971] ? vfs_write+0x9ec/0x1110 [ 168.250812][T29971] ? create_io_thread+0x1e0/0x1e0 [ 168.255674][T29971] __x64_sys_clone3+0x376/0x3a0 [ 168.260360][T29971] ? __ia32_sys_clone+0x290/0x290 [ 168.265222][T29971] ? fput+0x1a/0x20 [ 168.268868][T29971] ? debug_smp_processor_id+0x17/0x20 [ 168.274070][T29971] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 168.279974][T29971] ? exit_to_user_mode_prepare+0x39/0xa0 [ 168.285445][T29971] do_syscall_64+0x3d/0xb0 [ 168.289783][T29971] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 168.295511][T29971] RIP: 0033:0x7f52511e2ae9 [ 168.299763][T29971] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 10:29:26 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 83) 10:29:26 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) getpid() socket$igmp6(0xa, 0x3, 0x2) r1 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) 10:29:26 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x3, 0x0) 10:29:26 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x7, 0x495d}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000800)={r0, 0xfffffffffffffff7, 0x4}) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x6, 0x40) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @random="2cad2b2c29c7"}, 0x10) 10:29:26 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) (async) getpid() r1 = getpid() syz_open_procfs$userns(r1, 0x0) (async) r2 = syz_clone3(&(0x7f0000000280)={0x2080100, &(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0, {0x31}, &(0x7f0000000180)=""/17, 0x11, &(0x7f00000001c0)=""/128, &(0x7f0000000240)=[0x0, 0xffffffffffffffff, r1], 0x3}, 0x58) r5 = getpid() syz_open_procfs$userns(r5, 0x0) (async) r6 = syz_clone3(&(0x7f00000005c0)={0x8810cf6c95950af, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), {0x18}, &(0x7f0000000740)=""/200, 0xc8, &(0x7f0000000480)=""/212, &(0x7f0000000580)=[r0, r5, r0, r3, r1, r2, r5, r3], 0x8}, 0x58) getpid() r7 = getpid() syz_open_procfs$userns(r7, 0x0) (async) syz_clone3(&(0x7f00000006c0)={0x20a1000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0, {0x17}, &(0x7f00000011c0)=""/4110, 0x100e, &(0x7f00000010c0)=""/28, &(0x7f0000000680)=[r5, r1, r3, r5, r4, r6, r1, r0, r7], 0x9}, 0x58) process_vm_readv(r8, 0x0, 0xffffffffffffff68, 0x0, 0x0, 0x0) 10:29:26 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40), 0x0, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) [ 168.319203][T29971] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 168.327449][T29971] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 168.335261][T29971] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 168.343071][T29971] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 168.350887][T29971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 168.358694][T29971] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 168.366507][T29971] 10:29:26 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x3, 0x0) 10:29:26 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) getpid() socket$igmp6(0xa, 0x3, 0x2) open(0x0, 0x680002, 0x0) 10:29:26 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40), 0x0, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:26 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x3, 0x0) 10:29:26 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x7, 0x495d}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000800)={r0, 0xfffffffffffffff7, 0x4}) (async, rerun: 32) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x6, 0x40) (rerun: 32) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @random="2cad2b2c29c7"}, 0x10) 10:29:26 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) getpid() (async) r1 = getpid() syz_open_procfs$userns(r1, 0x0) (async) r2 = syz_clone3(&(0x7f0000000280)={0x2080100, &(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0, {0x31}, &(0x7f0000000180)=""/17, 0x11, &(0x7f00000001c0)=""/128, &(0x7f0000000240)=[0x0, 0xffffffffffffffff, r1], 0x3}, 0x58) (async, rerun: 32) r5 = getpid() (rerun: 32) syz_open_procfs$userns(r5, 0x0) r6 = syz_clone3(&(0x7f00000005c0)={0x8810cf6c95950af, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), {0x18}, &(0x7f0000000740)=""/200, 0xc8, &(0x7f0000000480)=""/212, &(0x7f0000000580)=[r0, r5, r0, r3, r1, r2, r5, r3], 0x8}, 0x58) (async) getpid() (async, rerun: 32) r7 = getpid() (rerun: 32) syz_open_procfs$userns(r7, 0x0) (async) syz_clone3(&(0x7f00000006c0)={0x20a1000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0, {0x17}, &(0x7f00000011c0)=""/4110, 0x100e, &(0x7f00000010c0)=""/28, &(0x7f0000000680)=[r5, r1, r3, r5, r4, r6, r1, r0, r7], 0x9}, 0x58) process_vm_readv(r8, 0x0, 0xffffffffffffff68, 0x0, 0x0, 0x0) [ 168.389155][T30000] FAULT_INJECTION: forcing a failure. [ 168.389155][T30000] name failslab, interval 1, probability 0, space 0, times 0 [ 168.417480][T30000] CPU: 0 PID: 30000 Comm: syz-executor.2 Tainted: G B 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 168.429030][T30000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 168.438927][T30000] Call Trace: [ 168.442049][T30000] [ 168.444828][T30000] dump_stack_lvl+0x151/0x1b7 [ 168.449341][T30000] ? io_uring_drop_tctx_refs+0x190/0x190 [ 168.454808][T30000] dump_stack+0x15/0x17 [ 168.458800][T30000] should_fail+0x3c6/0x510 [ 168.463055][T30000] __should_failslab+0xa4/0xe0 [ 168.467651][T30000] ? anon_vma_clone+0x9a/0x500 [ 168.472253][T30000] should_failslab+0x9/0x20 [ 168.476594][T30000] slab_pre_alloc_hook+0x37/0xd0 [ 168.481365][T30000] ? anon_vma_clone+0x9a/0x500 [ 168.485965][T30000] kmem_cache_alloc+0x44/0x200 [ 168.490569][T30000] anon_vma_clone+0x9a/0x500 [ 168.494994][T30000] anon_vma_fork+0x91/0x4e0 [ 168.499328][T30000] ? anon_vma_name+0x43/0x70 [ 168.503758][T30000] ? vm_area_dup+0x17a/0x230 [ 168.508184][T30000] dup_mm+0x8c5/0x12c0 [ 168.512092][T30000] ? copy_init_mm+0x20/0x20 [ 168.516435][T30000] copy_mm+0x107/0x1b0 [ 168.520335][T30000] copy_process+0x12bc/0x3260 [ 168.524851][T30000] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 168.529799][T30000] ? copy_clone_args_from_user+0x744/0x830 [ 168.535436][T30000] kernel_clone+0x21e/0x9e0 [ 168.539778][T30000] ? __delayed_free_task+0x20/0x20 [ 168.544722][T30000] ? vfs_write+0x9ec/0x1110 [ 168.549062][T30000] ? create_io_thread+0x1e0/0x1e0 [ 168.553926][T30000] __x64_sys_clone3+0x376/0x3a0 [ 168.558621][T30000] ? __ia32_sys_clone+0x290/0x290 [ 168.563474][T30000] ? fput+0x1a/0x20 [ 168.567118][T30000] ? debug_smp_processor_id+0x17/0x20 [ 168.572326][T30000] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 168.578226][T30000] ? exit_to_user_mode_prepare+0x39/0xa0 [ 168.583693][T30000] do_syscall_64+0x3d/0xb0 [ 168.587947][T30000] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 168.593680][T30000] RIP: 0033:0x7f52511e2ae9 [ 168.597933][T30000] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 168.617376][T30000] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 168.625610][T30000] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 10:29:27 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 84) 10:29:27 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) getpid() socket$igmp6(0xa, 0x3, 0x2) 10:29:27 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) getpid() process_vm_readv(0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:27 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{0x0}, {&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:27 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x7, 0x495d}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000800)={r0, 0xfffffffffffffff7, 0x4}) (async) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x6, 0x40) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @random="2cad2b2c29c7"}, 0x10) 10:29:27 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) getpid() [ 168.633424][T30000] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 168.641234][T30000] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 168.649041][T30000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 168.656855][T30000] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 168.664667][T30000] [ 168.685025][T30024] FAULT_INJECTION: forcing a failure. 10:29:27 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) getpid() process_vm_readv(0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:27 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{0x0}, {&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) [ 168.685025][T30024] name failslab, interval 1, probability 0, space 0, times 0 [ 168.698236][T30024] CPU: 0 PID: 30024 Comm: syz-executor.2 Tainted: G B 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 168.709784][T30024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 168.719667][T30024] Call Trace: [ 168.722788][T30024] [ 168.725569][T30024] dump_stack_lvl+0x151/0x1b7 [ 168.730081][T30024] ? io_uring_drop_tctx_refs+0x190/0x190 [ 168.735550][T30024] dump_stack+0x15/0x17 10:29:27 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) getpid() process_vm_readv(0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:27 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) 10:29:27 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{0x0}, {&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) [ 168.739539][T30024] should_fail+0x3c6/0x510 [ 168.743792][T30024] __should_failslab+0xa4/0xe0 [ 168.748394][T30024] ? anon_vma_clone+0x9a/0x500 [ 168.752993][T30024] should_failslab+0x9/0x20 [ 168.757328][T30024] slab_pre_alloc_hook+0x37/0xd0 [ 168.762100][T30024] ? anon_vma_clone+0x9a/0x500 [ 168.766700][T30024] kmem_cache_alloc+0x44/0x200 [ 168.771309][T30024] anon_vma_clone+0x9a/0x500 [ 168.775736][T30024] anon_vma_fork+0x91/0x4e0 [ 168.780075][T30024] ? anon_vma_name+0x43/0x70 [ 168.784504][T30024] ? vm_area_dup+0x17a/0x230 [ 168.788927][T30024] dup_mm+0x8c5/0x12c0 [ 168.792832][T30024] ? copy_init_mm+0x20/0x20 [ 168.797173][T30024] copy_mm+0x107/0x1b0 [ 168.801075][T30024] copy_process+0x12bc/0x3260 [ 168.805590][T30024] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 168.810534][T30024] ? copy_clone_args_from_user+0x744/0x830 [ 168.816174][T30024] kernel_clone+0x21e/0x9e0 [ 168.820514][T30024] ? __delayed_free_task+0x20/0x20 [ 168.825893][T30024] ? vfs_write+0x9ec/0x1110 [ 168.830233][T30024] ? create_io_thread+0x1e0/0x1e0 [ 168.835101][T30024] __x64_sys_clone3+0x376/0x3a0 [ 168.839778][T30024] ? __ia32_sys_clone+0x290/0x290 [ 168.844640][T30024] ? fput+0x1a/0x20 [ 168.848306][T30024] ? debug_smp_processor_id+0x17/0x20 [ 168.853493][T30024] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 168.859394][T30024] ? exit_to_user_mode_prepare+0x39/0xa0 [ 168.864859][T30024] do_syscall_64+0x3d/0xb0 [ 168.869114][T30024] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 168.874842][T30024] RIP: 0033:0x7f52511e2ae9 [ 168.879096][T30024] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 168.898539][T30024] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 168.906778][T30024] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 168.914590][T30024] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 168.922404][T30024] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 168.930213][T30024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:29:27 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/xpad', 0x408080, 0x20) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:27 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 85) 10:29:27 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) process_vm_readv(0x0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) 10:29:27 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, 0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:27 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{0x0}, {&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:27 executing program 3: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x2, 0x0, 0x39}) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:27 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/xpad', 0x408080, 0x20) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/xpad', 0x408080, 0x20) (async) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 10:29:27 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, 0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:27 executing program 3: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x2, 0x0, 0x39}) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) [ 168.938026][T30024] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 168.945840][T30024] [ 168.980977][T30050] FAULT_INJECTION: forcing a failure. 10:29:27 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) process_vm_readv(0x0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) 10:29:27 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{0x0}, {&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) [ 168.980977][T30050] name failslab, interval 1, probability 0, space 0, times 0 [ 169.008510][T30050] CPU: 1 PID: 30050 Comm: syz-executor.2 Tainted: G B 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 169.020063][T30050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 169.029961][T30050] Call Trace: [ 169.033085][T30050] [ 169.035863][T30050] dump_stack_lvl+0x151/0x1b7 10:29:27 executing program 3: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x2, 0x0, 0x39}) (async) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) 10:29:27 executing program 1: process_vm_readv(0x0, &(0x7f0000001800), 0x0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/215, 0xd7}, {&(0x7f00000011c0)=""/75, 0x4b}, {&(0x7f0000001240)=""/4097, 0x1001}], 0x3, 0x0) process_vm_readv(0x0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) [ 169.040377][T30050] ? io_uring_drop_tctx_refs+0x190/0x190 [ 169.045932][T30050] dump_stack+0x15/0x17 [ 169.049920][T30050] should_fail+0x3c6/0x510 [ 169.054179][T30050] __should_failslab+0xa4/0xe0 [ 169.058778][T30050] ? anon_vma_fork+0x1df/0x4e0 [ 169.063378][T30050] should_failslab+0x9/0x20 [ 169.067711][T30050] slab_pre_alloc_hook+0x37/0xd0 [ 169.072480][T30050] ? anon_vma_fork+0x1df/0x4e0 [ 169.077079][T30050] kmem_cache_alloc+0x44/0x200 [ 169.081680][T30050] anon_vma_fork+0x1df/0x4e0 [ 169.086108][T30050] dup_mm+0x8c5/0x12c0 [ 169.090101][T30050] ? copy_init_mm+0x20/0x20 [ 169.094438][T30050] copy_mm+0x107/0x1b0 [ 169.098345][T30050] copy_process+0x12bc/0x3260 [ 169.102860][T30050] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 169.107805][T30050] ? copy_clone_args_from_user+0x744/0x830 [ 169.113447][T30050] kernel_clone+0x21e/0x9e0 [ 169.117784][T30050] ? __delayed_free_task+0x20/0x20 [ 169.122733][T30050] ? vfs_write+0x9ec/0x1110 [ 169.127073][T30050] ? create_io_thread+0x1e0/0x1e0 [ 169.131935][T30050] __x64_sys_clone3+0x376/0x3a0 [ 169.136629][T30050] ? __ia32_sys_clone+0x290/0x290 [ 169.141484][T30050] ? fput+0x1a/0x20 [ 169.145128][T30050] ? debug_smp_processor_id+0x17/0x20 [ 169.150333][T30050] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 169.156247][T30050] ? exit_to_user_mode_prepare+0x39/0xa0 [ 169.161702][T30050] do_syscall_64+0x3d/0xb0 [ 169.165962][T30050] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 169.171683][T30050] RIP: 0033:0x7f52511e2ae9 [ 169.175944][T30050] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 169.195397][T30050] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 169.203620][T30050] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 169.211434][T30050] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 169.219245][T30050] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 169.227060][T30050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 169.234865][T30050] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 10:29:27 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 86) 10:29:27 executing program 1: r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) 10:29:27 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{0x0}, {&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:27 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/xpad', 0x408080, 0x20) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:29:27 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, 0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:27 executing program 3: r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000040)=0x3e8) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000140)={'wg2\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000180)={'gre0\x00', 0x0, 0x27, 0x1, 0x6, 0x1ff, {{0xa, 0x4, 0x1, 0x7, 0x28, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x3b}, {[@generic={0x94, 0xf, "98b102caced0359d390841f267"}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x8, 0x80, 0x2, 0x8, {{0x7, 0x4, 0x3, 0x3, 0x1c, 0x64, 0x0, 0x0, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x42}, @local, {[@lsrr={0x83, 0x7, 0x1d, [@private=0xa010101]}]}}}}}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000740)={0x1cc, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x80}, 0x200000c0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x5}, 0x8) [ 169.242681][T30050] 10:29:27 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}], 0x3, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:27 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) process_vm_readv(0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{0x0}, {&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:27 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/124, 0x7c}, {&(0x7f0000000080)=""/254, 0xfe}, {&(0x7f0000000180)=""/4096, 0x1000}], 0x3, &(0x7f0000003680)=[{&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/128, 0x80}, {&(0x7f0000002240)=""/4096, 0x1000}, {&(0x7f0000003240)=""/68, 0x44}, {&(0x7f00000032c0)=""/240, 0xf0}, {&(0x7f00000033c0)=""/197, 0xc5}, {&(0x7f00000034c0)=""/188, 0xbc}, {&(0x7f0000003580)}, {&(0x7f00000035c0)=""/58, 0x3a}, {&(0x7f0000003600)=""/82, 0x52}], 0xa, 0x0) 10:29:27 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/124, 0x7c}, {&(0x7f0000000080)=""/254, 0xfe}, {&(0x7f0000000180)=""/4096, 0x1000}], 0x3, &(0x7f0000003680)=[{&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/128, 0x80}, {&(0x7f0000002240)=""/4096, 0x1000}, {&(0x7f0000003240)=""/68, 0x44}, {&(0x7f00000032c0)=""/240, 0xf0}, {&(0x7f00000033c0)=""/197, 0xc5}, {&(0x7f00000034c0)=""/188, 0xbc}, {&(0x7f0000003580)}, {&(0x7f00000035c0)=""/58, 0x3a}, {&(0x7f0000003600)=""/82, 0x52}], 0xa, 0x0) 10:29:27 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}], 0x3, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:27 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) process_vm_readv(0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{0x0}, {&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) [ 169.289183][T30090] FAULT_INJECTION: forcing a failure. [ 169.289183][T30090] name failslab, interval 1, probability 0, space 0, times 0 [ 169.308993][T30090] CPU: 1 PID: 30090 Comm: syz-executor.2 Tainted: G B 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 169.320541][T30090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 169.330440][T30090] Call Trace: [ 169.333559][T30090] [ 169.336345][T30090] dump_stack_lvl+0x151/0x1b7 [ 169.340854][T30090] ? io_uring_drop_tctx_refs+0x190/0x190 [ 169.346323][T30090] dump_stack+0x15/0x17 [ 169.350320][T30090] should_fail+0x3c6/0x510 [ 169.354560][T30090] __should_failslab+0xa4/0xe0 [ 169.359165][T30090] ? anon_vma_fork+0x1df/0x4e0 [ 169.363767][T30090] should_failslab+0x9/0x20 [ 169.368104][T30090] slab_pre_alloc_hook+0x37/0xd0 [ 169.372881][T30090] ? anon_vma_fork+0x1df/0x4e0 [ 169.377477][T30090] kmem_cache_alloc+0x44/0x200 [ 169.382079][T30090] anon_vma_fork+0x1df/0x4e0 [ 169.386502][T30090] dup_mm+0x8c5/0x12c0 [ 169.390406][T30090] ? copy_init_mm+0x20/0x20 [ 169.394743][T30090] copy_mm+0x107/0x1b0 [ 169.398649][T30090] copy_process+0x12bc/0x3260 [ 169.403174][T30090] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 169.408109][T30090] ? copy_clone_args_from_user+0x744/0x830 [ 169.414181][T30090] kernel_clone+0x21e/0x9e0 [ 169.418533][T30090] ? __delayed_free_task+0x20/0x20 [ 169.423470][T30090] ? vfs_write+0x9ec/0x1110 [ 169.427809][T30090] ? create_io_thread+0x1e0/0x1e0 [ 169.432670][T30090] __x64_sys_clone3+0x376/0x3a0 [ 169.437357][T30090] ? __ia32_sys_clone+0x290/0x290 [ 169.442217][T30090] ? fput+0x1a/0x20 [ 169.445859][T30090] ? debug_smp_processor_id+0x17/0x20 [ 169.451070][T30090] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 169.456972][T30090] ? exit_to_user_mode_prepare+0x39/0xa0 [ 169.462439][T30090] do_syscall_64+0x3d/0xb0 [ 169.466698][T30090] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 169.472418][T30090] RIP: 0033:0x7f52511e2ae9 [ 169.476672][T30090] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 169.496122][T30090] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 169.504362][T30090] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 169.512170][T30090] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 169.519987][T30090] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 169.527794][T30090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:29:28 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 87) 10:29:28 executing program 1: getpgrp(0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) 10:29:28 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) process_vm_readv(0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{0x0}, {&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:28 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = getpid() process_vm_readv(r0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/124, 0x7c}, {&(0x7f0000000080)=""/254, 0xfe}, {&(0x7f0000000180)=""/4096, 0x1000}], 0x3, &(0x7f0000003680)=[{&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/128, 0x80}, {&(0x7f0000002240)=""/4096, 0x1000}, {&(0x7f0000003240)=""/68, 0x44}, {&(0x7f00000032c0)=""/240, 0xf0}, {&(0x7f00000033c0)=""/197, 0xc5}, {&(0x7f00000034c0)=""/188, 0xbc}, {&(0x7f0000003580)}, {&(0x7f00000035c0)=""/58, 0x3a}, {&(0x7f0000003600)=""/82, 0x52}], 0xa, 0x0) 10:29:28 executing program 3: r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) (async, rerun: 32) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000040)=0x3e8) (rerun: 32) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000140)={'wg2\x00', 0x0}) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000180)={'gre0\x00', 0x0, 0x27, 0x1, 0x6, 0x1ff, {{0xa, 0x4, 0x1, 0x7, 0x28, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x3b}, {[@generic={0x94, 0xf, "98b102caced0359d390841f267"}, @ra={0x94, 0x4, 0x1}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x8, 0x80, 0x2, 0x8, {{0x7, 0x4, 0x3, 0x3, 0x1c, 0x64, 0x0, 0x0, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x42}, @local, {[@lsrr={0x83, 0x7, 0x1d, [@private=0xa010101]}]}}}}}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000740)={0x1cc, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x80}, 0x200000c0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x5}, 0x8) 10:29:28 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}], 0x3, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:28 executing program 0: r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{0x0}, {&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:28 executing program 1: getpgrp(0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) 10:29:28 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0xffffff83, 0x0) syz_clone3(&(0x7f0000001600)={0x10000800, &(0x7f0000000000), &(0x7f00000013c0), &(0x7f0000001400)=0x0, {0x2f}, &(0x7f0000001440)=""/194, 0xc2, &(0x7f0000001540)=""/65, &(0x7f00000015c0)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0xa}, 0x58) process_vm_readv(r0, &(0x7f0000001900)=[{&(0x7f0000001680)=""/61, 0x3d}, {&(0x7f00000016c0)=""/68, 0x44}, {&(0x7f0000001740)=""/92, 0x5c}, {&(0x7f00000017c0)=""/140, 0x8c}, {&(0x7f0000001880)=""/50, 0x32}, {&(0x7f00000018c0)=""/19, 0x13}], 0x6, &(0x7f0000002040)=[{&(0x7f0000001980)=""/70, 0x46}, {&(0x7f0000001a00)=""/56, 0x38}, {&(0x7f0000001a40)=""/9, 0x9}, {&(0x7f0000001a80)=""/238, 0xee}, {&(0x7f0000001b80)=""/152, 0x98}, {&(0x7f0000001c40)=""/246, 0xf6}, {&(0x7f0000001d40)=""/112, 0x70}, {&(0x7f0000001dc0)=""/102, 0x66}, {&(0x7f0000001e40)=""/201, 0xc9}, {&(0x7f0000001f40)=""/201, 0xc9}], 0xa, 0x0) process_vm_readv(0x0, &(0x7f0000000000), 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)=""/240, 0xf0}, {&(0x7f0000000140)=""/56, 0x38}, {&(0x7f0000000180)=""/80, 0x50}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/211, 0xd3}, {&(0x7f0000001300)=""/33, 0x21}], 0x6, 0x0) [ 169.535604][T30090] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 169.543417][T30090] [ 169.562639][T30104] FAULT_INJECTION: forcing a failure. [ 169.562639][T30104] name failslab, interval 1, probability 0, space 0, times 0 10:29:28 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {0x0}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:28 executing program 3: r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000040)=0x3e8) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000140)={'wg2\x00', 0x0}) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000180)={'gre0\x00', 0x0, 0x27, 0x1, 0x6, 0x1ff, {{0xa, 0x4, 0x1, 0x7, 0x28, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x3b}, {[@generic={0x94, 0xf, "98b102caced0359d390841f267"}, @ra={0x94, 0x4, 0x1}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x8, 0x80, 0x2, 0x8, {{0x7, 0x4, 0x3, 0x3, 0x1c, 0x64, 0x0, 0x0, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x42}, @local, {[@lsrr={0x83, 0x7, 0x1d, [@private=0xa010101]}]}}}}}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000740)={0x1cc, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x80}, 0x200000c0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x5}, 0x8) 10:29:28 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {0x0}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) [ 169.582917][T30104] CPU: 1 PID: 30104 Comm: syz-executor.2 Tainted: G B 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 169.594558][T30104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 169.604449][T30104] Call Trace: [ 169.607575][T30104] [ 169.610440][T30104] dump_stack_lvl+0x151/0x1b7 [ 169.614954][T30104] ? io_uring_drop_tctx_refs+0x190/0x190 [ 169.620420][T30104] dump_stack+0x15/0x17 [ 169.624411][T30104] should_fail+0x3c6/0x510 [ 169.628666][T30104] __should_failslab+0xa4/0xe0 [ 169.633267][T30104] ? anon_vma_clone+0x9a/0x500 [ 169.637863][T30104] should_failslab+0x9/0x20 [ 169.642204][T30104] slab_pre_alloc_hook+0x37/0xd0 [ 169.647069][T30104] ? anon_vma_clone+0x9a/0x500 [ 169.651662][T30104] kmem_cache_alloc+0x44/0x200 [ 169.656265][T30104] anon_vma_clone+0x9a/0x500 [ 169.660690][T30104] anon_vma_fork+0x91/0x4e0 [ 169.665027][T30104] ? anon_vma_name+0x4c/0x70 [ 169.669457][T30104] ? vm_area_dup+0x17a/0x230 [ 169.673882][T30104] dup_mm+0x8c5/0x12c0 [ 169.677790][T30104] ? copy_init_mm+0x20/0x20 [ 169.682129][T30104] copy_mm+0x107/0x1b0 [ 169.686032][T30104] copy_process+0x12bc/0x3260 [ 169.690553][T30104] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 169.695495][T30104] ? copy_clone_args_from_user+0x744/0x830 [ 169.701135][T30104] kernel_clone+0x21e/0x9e0 [ 169.705470][T30104] ? __delayed_free_task+0x20/0x20 [ 169.710417][T30104] ? vfs_write+0x9ec/0x1110 [ 169.714752][T30104] ? create_io_thread+0x1e0/0x1e0 [ 169.719702][T30104] __x64_sys_clone3+0x376/0x3a0 [ 169.724389][T30104] ? __ia32_sys_clone+0x290/0x290 [ 169.729251][T30104] ? fput+0x1a/0x20 [ 169.732896][T30104] ? debug_smp_processor_id+0x17/0x20 [ 169.738103][T30104] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 169.744009][T30104] ? exit_to_user_mode_prepare+0x39/0xa0 [ 169.749472][T30104] do_syscall_64+0x3d/0xb0 [ 169.753726][T30104] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 169.759451][T30104] RIP: 0033:0x7f52511e2ae9 [ 169.763708][T30104] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 169.783157][T30104] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 10:29:28 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 88) 10:29:28 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {0x0}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:28 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 10:29:28 executing program 1: getpgrp(0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000980)=""/146, 0x92}], 0xa, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) 10:29:28 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0xffffff83, 0x0) (async) syz_clone3(&(0x7f0000001600)={0x10000800, &(0x7f0000000000), &(0x7f00000013c0), &(0x7f0000001400)=0x0, {0x2f}, &(0x7f0000001440)=""/194, 0xc2, &(0x7f0000001540)=""/65, &(0x7f00000015c0)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0xa}, 0x58) process_vm_readv(r0, &(0x7f0000001900)=[{&(0x7f0000001680)=""/61, 0x3d}, {&(0x7f00000016c0)=""/68, 0x44}, {&(0x7f0000001740)=""/92, 0x5c}, {&(0x7f00000017c0)=""/140, 0x8c}, {&(0x7f0000001880)=""/50, 0x32}, {&(0x7f00000018c0)=""/19, 0x13}], 0x6, &(0x7f0000002040)=[{&(0x7f0000001980)=""/70, 0x46}, {&(0x7f0000001a00)=""/56, 0x38}, {&(0x7f0000001a40)=""/9, 0x9}, {&(0x7f0000001a80)=""/238, 0xee}, {&(0x7f0000001b80)=""/152, 0x98}, {&(0x7f0000001c40)=""/246, 0xf6}, {&(0x7f0000001d40)=""/112, 0x70}, {&(0x7f0000001dc0)=""/102, 0x66}, {&(0x7f0000001e40)=""/201, 0xc9}, {&(0x7f0000001f40)=""/201, 0xc9}], 0xa, 0x0) (async) process_vm_readv(0x0, &(0x7f0000000000), 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)=""/240, 0xf0}, {&(0x7f0000000140)=""/56, 0x38}, {&(0x7f0000000180)=""/80, 0x50}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/211, 0xd3}, {&(0x7f0000001300)=""/33, 0x21}], 0x6, 0x0) 10:29:28 executing program 0: getpid() process_vm_readv(0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{0x0}, {&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:28 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) (async) r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 10:29:28 executing program 1: r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, 0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) 10:29:28 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000140)=""/213, 0xd5}], 0x3, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) [ 169.791393][T30104] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 169.799204][T30104] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 169.807101][T30104] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 169.814910][T30104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 169.822721][T30104] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 169.830535][T30104] 10:29:28 executing program 5: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0xffffff83, 0x0) syz_clone3(&(0x7f0000001600)={0x10000800, &(0x7f0000000000), &(0x7f00000013c0), &(0x7f0000001400)=0x0, {0x2f}, &(0x7f0000001440)=""/194, 0xc2, &(0x7f0000001540)=""/65, &(0x7f00000015c0)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0xa}, 0x58) process_vm_readv(r0, &(0x7f0000001900)=[{&(0x7f0000001680)=""/61, 0x3d}, {&(0x7f00000016c0)=""/68, 0x44}, {&(0x7f0000001740)=""/92, 0x5c}, {&(0x7f00000017c0)=""/140, 0x8c}, {&(0x7f0000001880)=""/50, 0x32}, {&(0x7f00000018c0)=""/19, 0x13}], 0x6, &(0x7f0000002040)=[{&(0x7f0000001980)=""/70, 0x46}, {&(0x7f0000001a00)=""/56, 0x38}, {&(0x7f0000001a40)=""/9, 0x9}, {&(0x7f0000001a80)=""/238, 0xee}, {&(0x7f0000001b80)=""/152, 0x98}, {&(0x7f0000001c40)=""/246, 0xf6}, {&(0x7f0000001d40)=""/112, 0x70}, {&(0x7f0000001dc0)=""/102, 0x66}, {&(0x7f0000001e40)=""/201, 0xc9}, {&(0x7f0000001f40)=""/201, 0xc9}], 0xa, 0x0) process_vm_readv(0x0, &(0x7f0000000000), 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)=""/240, 0xf0}, {&(0x7f0000000140)=""/56, 0x38}, {&(0x7f0000000180)=""/80, 0x50}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/211, 0xd3}, {&(0x7f0000001300)=""/33, 0x21}], 0x6, 0x0) 10:29:28 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000140)=""/213, 0xd5}], 0x3, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:28 executing program 0: getpid() process_vm_readv(0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{0x0}, {&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) [ 169.879250][T30154] FAULT_INJECTION: forcing a failure. [ 169.879250][T30154] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 169.901040][T30154] CPU: 1 PID: 30154 Comm: syz-executor.2 Tainted: G B 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 169.912593][T30154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 169.922493][T30154] Call Trace: [ 169.925613][T30154] [ 169.928392][T30154] dump_stack_lvl+0x151/0x1b7 [ 169.933093][T30154] ? io_uring_drop_tctx_refs+0x190/0x190 [ 169.938550][T30154] dump_stack+0x15/0x17 [ 169.942541][T30154] should_fail+0x3c6/0x510 [ 169.946888][T30154] should_fail_alloc_page+0x5a/0x80 [ 169.951914][T30154] prepare_alloc_pages+0x15c/0x700 [ 169.956953][T30154] ? __alloc_pages_bulk+0xf50/0xf50 [ 169.961983][T30154] ? __alloc_pages+0x5e0/0x5e0 [ 169.966579][T30154] __alloc_pages+0x138/0x5e0 [ 169.971011][T30154] ? zone_watermark_fast+0x220/0x220 [ 169.976129][T30154] ? __alloc_pages+0x206/0x5e0 [ 169.980738][T30154] ? zone_watermark_fast+0x220/0x220 [ 169.985875][T30154] ? __kasan_check_write+0x14/0x20 [ 169.990799][T30154] ? _raw_spin_lock+0xa4/0x1b0 [ 169.995396][T30154] pte_alloc_one+0x73/0x1b0 [ 169.999735][T30154] ? pfn_modify_allowed+0x2f0/0x2f0 [ 170.005095][T30154] ? __pmd_alloc+0x48d/0x550 [ 170.009523][T30154] __pte_alloc+0x86/0x350 [ 170.014209][T30154] ? __pud_alloc+0x260/0x260 [ 170.018626][T30154] ? __pud_alloc+0x213/0x260 [ 170.023049][T30154] ? free_pgtables+0x280/0x280 [ 170.027651][T30154] ? do_handle_mm_fault+0x2330/0x2330 [ 170.032859][T30154] ? __stack_depot_save+0x34/0x470 [ 170.037803][T30154] ? anon_vma_clone+0x9a/0x500 [ 170.042428][T30154] copy_page_range+0x28a8/0x2f90 [ 170.047177][T30154] ? __kasan_slab_alloc+0xb1/0xe0 [ 170.052036][T30154] ? slab_post_alloc_hook+0x53/0x2c0 [ 170.057162][T30154] ? copy_process+0x12bc/0x3260 [ 170.061845][T30154] ? __x64_sys_clone3+0x376/0x3a0 [ 170.066704][T30154] ? do_syscall_64+0x3d/0xb0 [ 170.071130][T30154] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 170.077037][T30154] ? pfn_valid+0x1e0/0x1e0 [ 170.081288][T30154] ? rwsem_write_trylock+0x15b/0x290 [ 170.086409][T30154] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 170.092658][T30154] dup_mm+0xadc/0x12c0 [ 170.096565][T30154] ? copy_init_mm+0x20/0x20 [ 170.100994][T30154] copy_mm+0x107/0x1b0 [ 170.105156][T30154] copy_process+0x12bc/0x3260 [ 170.109792][T30154] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 170.114734][T30154] ? copy_clone_args_from_user+0x744/0x830 [ 170.120368][T30154] kernel_clone+0x21e/0x9e0 [ 170.124794][T30154] ? __delayed_free_task+0x20/0x20 [ 170.129742][T30154] ? vfs_write+0x9ec/0x1110 [ 170.134085][T30154] ? create_io_thread+0x1e0/0x1e0 [ 170.138954][T30154] __x64_sys_clone3+0x376/0x3a0 [ 170.143626][T30154] ? __ia32_sys_clone+0x290/0x290 [ 170.148488][T30154] ? fput+0x1a/0x20 [ 170.152139][T30154] ? debug_smp_processor_id+0x17/0x20 [ 170.157341][T30154] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 170.163247][T30154] ? exit_to_user_mode_prepare+0x39/0xa0 [ 170.169494][T30154] do_syscall_64+0x3d/0xb0 [ 170.173744][T30154] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 170.179471][T30154] RIP: 0033:0x7f52511e2ae9 [ 170.183727][T30154] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 170.203169][T30154] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 170.211412][T30154] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 170.219225][T30154] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 10:29:28 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 89) 10:29:28 executing program 0: getpid() process_vm_readv(0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{0x0}, {&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:28 executing program 1: r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, 0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) 10:29:28 executing program 5: r0 = getpid() r1 = syz_open_procfs$userns(r0, 0x0) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) mount_setattr(r2, &(0x7f0000000000)='./file0\x00', 0x8100, &(0x7f0000000040)={0x70, 0x1, 0x180000, {r1}}, 0x20) process_vm_readv(r0, 0x0, 0x0, 0x0, 0xffffffffffffffa3, 0x0) 10:29:28 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {&(0x7f0000000140)=""/213, 0xd5}], 0x3, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:28 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) (async, rerun: 32) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) (async, rerun: 32) r0 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 10:29:28 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x108, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x80}, 0x20060040) 10:29:28 executing program 5: r0 = getpid() r1 = syz_open_procfs$userns(r0, 0x0) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) mount_setattr(r2, &(0x7f0000000000)='./file0\x00', 0x8100, &(0x7f0000000040)={0x70, 0x1, 0x180000, {r1}}, 0x20) process_vm_readv(r0, 0x0, 0x0, 0x0, 0xffffffffffffffa3, 0x0) getpid() (async) syz_open_procfs$userns(r0, 0x0) (async) open(0x0, 0x680002, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) (async) mount_setattr(r2, &(0x7f0000000000)='./file0\x00', 0x8100, &(0x7f0000000040)={0x70, 0x1, 0x180000, {r1}}, 0x20) (async) process_vm_readv(r0, 0x0, 0x0, 0x0, 0xffffffffffffffa3, 0x0) (async) [ 170.227036][T30154] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 [ 170.234843][T30154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 170.242654][T30154] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 170.250473][T30154] 10:29:28 executing program 1: r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, 0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) 10:29:28 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {0x0}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:28 executing program 0: r0 = getpid() process_vm_readv(r0, 0x0, 0x0, &(0x7f0000001640)=[{0x0}, {&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:28 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {0x0}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) [ 170.287392][T30177] FAULT_INJECTION: forcing a failure. [ 170.287392][T30177] name failslab, interval 1, probability 0, space 0, times 0 [ 170.300083][T30177] CPU: 1 PID: 30177 Comm: syz-executor.2 Tainted: G B 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 170.311661][T30177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 170.321642][T30177] Call Trace: [ 170.324776][T30177] [ 170.327542][T30177] dump_stack_lvl+0x151/0x1b7 [ 170.332060][T30177] ? io_uring_drop_tctx_refs+0x190/0x190 [ 170.337527][T30177] dump_stack+0x15/0x17 [ 170.341519][T30177] should_fail+0x3c6/0x510 [ 170.346031][T30177] __should_failslab+0xa4/0xe0 [ 170.350628][T30177] ? anon_vma_clone+0x9a/0x500 [ 170.355231][T30177] should_failslab+0x9/0x20 [ 170.359570][T30177] slab_pre_alloc_hook+0x37/0xd0 [ 170.364346][T30177] ? anon_vma_clone+0x9a/0x500 [ 170.368943][T30177] kmem_cache_alloc+0x44/0x200 [ 170.373549][T30177] anon_vma_clone+0x9a/0x500 [ 170.377975][T30177] anon_vma_fork+0x91/0x4e0 [ 170.382307][T30177] ? anon_vma_name+0x4c/0x70 [ 170.386736][T30177] ? vm_area_dup+0x17a/0x230 [ 170.391160][T30177] dup_mm+0x8c5/0x12c0 [ 170.395071][T30177] ? copy_init_mm+0x20/0x20 [ 170.399413][T30177] copy_mm+0x107/0x1b0 [ 170.403309][T30177] copy_process+0x12bc/0x3260 [ 170.407824][T30177] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 170.412766][T30177] ? copy_clone_args_from_user+0x744/0x830 [ 170.418413][T30177] kernel_clone+0x21e/0x9e0 [ 170.422746][T30177] ? __delayed_free_task+0x20/0x20 [ 170.427694][T30177] ? vfs_write+0x9ec/0x1110 [ 170.432585][T30177] ? create_io_thread+0x1e0/0x1e0 [ 170.437457][T30177] __x64_sys_clone3+0x376/0x3a0 [ 170.442132][T30177] ? __ia32_sys_clone+0x290/0x290 [ 170.446992][T30177] ? fput+0x1a/0x20 [ 170.450641][T30177] ? debug_smp_processor_id+0x17/0x20 [ 170.455939][T30177] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 170.461833][T30177] ? exit_to_user_mode_prepare+0x39/0xa0 [ 170.467302][T30177] do_syscall_64+0x3d/0xb0 [ 170.471554][T30177] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 170.477285][T30177] RIP: 0033:0x7f52511e2ae9 [ 170.481537][T30177] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 170.500975][T30177] RSP: 002b:00007f524ff64f98 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 170.509308][T30177] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f52511e2ae9 [ 170.517116][T30177] RDX: 00007f524ff64fb0 RSI: 0000000000000058 RDI: 00007f524ff64fb0 [ 170.525015][T30177] RBP: 00007f524ff65120 R08: 0000000000000000 R09: 0000000000000058 10:29:29 executing program 2: syz_clone3(&(0x7f0000000300)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 90) 10:29:29 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x108, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x80}, 0x20060040) (async) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x108, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x80}, 0x20060040) 10:29:29 executing program 1: r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}, {&(0x7f0000002280)=""/4096, 0x1000}], 0x9, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) 10:29:29 executing program 0: r0 = getpid() process_vm_readv(r0, 0x0, 0x0, &(0x7f0000001640)=[{0x0}, {&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:29 executing program 5: r0 = getpid() r1 = syz_open_procfs$userns(r0, 0x0) r2 = open(0x0, 0x680002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) mount_setattr(r2, &(0x7f0000000000)='./file0\x00', 0x8100, &(0x7f0000000040)={0x70, 0x1, 0x180000, {r1}}, 0x20) process_vm_readv(r0, 0x0, 0x0, 0x0, 0xffffffffffffffa3, 0x0) 10:29:29 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {0x0}, {0x0}, {&(0x7f0000000140)=""/213, 0xd5}], 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:29 executing program 0: r0 = getpid() process_vm_readv(r0, 0x0, 0x0, &(0x7f0000001640)=[{0x0}, {&(0x7f0000001500)=""/158, 0x9e}, {0x0}, {&(0x7f00000015c0)=""/96, 0x60}], 0x4, 0x0) 10:29:29 executing program 5: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), 0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), 0xffffffffffffffff) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 170.533000][T30177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 170.540815][T30177] R13: 000000000000000b R14: 00007f5251301f80 R15: 00007ffedb72aae8 [ 170.548627][T30177] 10:29:29 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/213, 0xd5}], 0x3, &(0x7f0000001640)=[{&(0x7f0000001480)=""/105, 0x69}, {&(0x7f0000001500)=""/158, 0x9e}, {&(0x7f0000000340)}], 0x3, 0x0) 10:29:29 executing program 3: process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/76, 0x4c}], 0x1, &(0x7f0000001e40)=[{&(0x7f0000001840)=""/77, 0x4d}, {0x0}], 0x2, 0x0) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x108, r0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x80}, 0x20060040) 10:29:29 executing program 1: r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/192, 0xc0}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000600)=""/47, 0x2f}, {&(0x7f0000000640)=""/105, 0x69}, {&(0x7f00000006c0)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/250, 0xfa}, {&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/179, 0xb3}], 0x8, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/116, 0x74}], 0x1, 0x0) 10:29:29 executing program 5: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), 0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), 0xffffffffffffffff) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), 0xffffffffffffffff) (async) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), 0xffffffffffffffff) (async) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) [ 170.579849][T30205] FAULT_INJECTION: forcing a failure. [ 170.579849][T30205] name failslab, interval 1, probability 0, space 0, times 0 [ 170.612190][T30205] CPU: 0 PID: 30205 Comm: syz-executor.2 Tainted: G B 5.15.122-syzkaller-00676-g1463976ddc64 #0 [ 170.623747][T30205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 170.633637][T30205] Call Trace: [ 170.636761][T30205] [ 170.639540][T30205] dump_stack_lvl+0x151/0x1b7 [ 170.644053][T30205] ? io_uring_drop_tctx_refs+0x190/0x190 [ 170.649513][T30205] dump_stack+0x15/0x17 [ 170.653527][T30205] should_fail+0x3c6/0x510 [ 170.657844][T30205] __should_failslab+0xa4/0xe0 [ 170.662451][T30205] ? anon_vma_clone+0x9a/0x500 [ 170.667050][T30205] should_failslab+0x9/0x20 [ 170.671383][T30205] slab_pre_alloc_hook+0x37/0xd0 [ 170.676169][T30205] ? anon_vma_clone+0x9a/0x500 [ 170.680756][T30205] kmem_cache_alloc+0x44/0x200 [ 170.685357][T30205] anon_vma_clone+0x9a/0x500 [ 170.689795][T30205] anon_vma_fork+0x91/0x4e0 [ 170.694132][T30205] ? anon_vma_name+0x4c/0x70 [ 170.698550][T30205] ? vm_area_dup+0x17a/0x230 [ 170.702975][T30205] dup_mm+0x8c5/0x12c0 [ 170.706883][T30205] ? copy_init_mm+0x20/0x20 [ 170.711223][T30205] copy_mm+0x107/0x1b0 [ 170.715135][T30205] copy_process+0x12bc/0x3260 [ 170.719642][T30205] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 170.724589][T30205] ? copy_clone_args_from_user+0x744/0x830 [ 170.730229][T30205] kernel_clone+0x21e/0x9e0 [ 170.734567][T30205] ? __delayed_free_task+0x20/0x20 [ 170.739513][T30205] ? vfs_write+0x9ec/0x1110 [ 170.743869][T30205] ? create_io_thread+0x1e0/0x1e0 [ 170.748715][T30205] __x64_sys_clone3+0x376/0x3a0 [ 170.753401][T30205] ? __ia32_sys_clone+0x290/0x290 [ 170.758264][T30205] ? fput+0x1a/0x20 [ 170.761913][T30205] ? debug_smp_processor_id+0x17/0x20 [ 170.767119][T30205] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 170.773025][T30205] ? exit_to_user_mode_prepare+0x39/0xa0 [ 170.778489][T30205] do_syscall_64+0x3d/0xb0 [ 170.782795][T30205] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 170.788553][T30205] RIP: 0033:0x7f52511e2ae9 [ 170.792809][T30205] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4