7f0000000000), &(0x7f0000000080), 0x0) [ 1217.555659][ T7847] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1217.578099][ T7847] wireguard12: entered promiscuous mode [ 1217.583884][ T7847] wireguard12: entered allmulticast mode 03:19:02 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef240000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:02 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef010600000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 3) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:02 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a90efbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1217.727341][ T7854] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1217.764711][ T7854] wireguard15: entered promiscuous mode [ 1217.770296][ T7854] wireguard15: entered allmulticast mode 03:19:03 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82041502, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x0) [ 1217.811044][ T7858] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1217.878416][ T7858] wireguard12: entered promiscuous mode [ 1217.884043][ T7858] wireguard12: entered allmulticast mode 03:19:03 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef250000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:03 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000700000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1218.011720][ T7873] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1218.041721][ T7873] wireguard15: entered promiscuous mode [ 1218.047399][ T7873] wireguard15: entered allmulticast mode [ 1218.090554][ T7878] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:19:03 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) (async) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000180)=""/262) (async) r2 = syz_clone(0x1002000, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000000)="77e47af51e03e1163c44b61edacbff9aa5f74f715f2888e980141f9c80c870078692f019a0cb34c359738a70e300b7a3ea15a8fffbb6b382aefd671792d1b8fc3e9621bf051c6f4913cfff01b3d1cc") capset(&(0x7f0000000080)={0x19971634, r2}, &(0x7f0000000100)={0x9, 0x3, 0x7ff, 0x0, 0x9, 0x101}) (async) mlockall(0x0) shmctl$SHM_UNLOCK(r0, 0xc) (async, rerun: 64) r3 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) (rerun: 64) shmctl$SHM_UNLOCK(r3, 0xc) (async) shmctl$SHM_LOCK(r3, 0xb) [ 1218.138307][ T7878] wireguard12: entered promiscuous mode [ 1218.143925][ T7878] wireguard12: entered allmulticast mode 03:19:03 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000900000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:03 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef2f0000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:03 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a90ffbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1218.311523][ T7885] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1218.347108][ T7885] wireguard15: entered promiscuous mode [ 1218.352742][ T7885] wireguard15: entered allmulticast mode 03:19:03 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82041d00, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x0) [ 1218.403165][ T7887] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1218.436705][ T7887] wireguard12: entered promiscuous mode [ 1218.442339][ T7887] wireguard12: entered allmulticast mode 03:19:03 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef320000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:03 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000a00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1218.594850][ T7898] wireguard15: entered promiscuous mode [ 1218.600571][ T7898] wireguard15: entered allmulticast mode 03:19:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 4) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1218.702101][ T7904] wireguard12: entered promiscuous mode [ 1218.707835][ T7904] wireguard12: entered allmulticast mode [ 1218.738414][ T7909] FAULT_INJECTION: forcing a failure. [ 1218.738414][ T7909] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1218.751535][ T7909] CPU: 0 PID: 7909 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1218.761868][ T7909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1218.771928][ T7909] Call Trace: [ 1218.775230][ T7909] [ 1218.778161][ T7909] dump_stack_lvl+0xda/0x130 [ 1218.782791][ T7909] dump_stack+0x15/0x20 [ 1218.787007][ T7909] should_fail_ex+0x21f/0x230 [ 1218.791732][ T7909] should_fail+0xb/0x10 [ 1218.795925][ T7909] should_fail_usercopy+0x1a/0x20 [ 1218.800973][ T7909] _copy_from_iter+0xf2/0xb60 [ 1218.805735][ T7909] ? kmalloc_reserve+0xfb/0x190 [ 1218.810587][ T7909] ? __build_skb_around+0x196/0x1f0 [ 1218.815839][ T7909] ? __virt_addr_valid+0x16a/0x1b0 [ 1218.820974][ T7909] ? __check_object_size+0x364/0x510 [ 1218.826266][ T7909] netlink_sendmsg+0x53c/0x770 [ 1218.831094][ T7909] ? netlink_getsockopt+0x3e0/0x3e0 [ 1218.836302][ T7909] ____sys_sendmsg+0x37c/0x4d0 [ 1218.841083][ T7909] __sys_sendmsg+0x1e9/0x270 [ 1218.845728][ T7909] __x64_sys_sendmsg+0x46/0x50 [ 1218.850723][ T7909] do_syscall_64+0x44/0x110 [ 1218.855284][ T7909] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1218.861253][ T7909] RIP: 0033:0x7efd2e8d0ce9 [ 1218.865718][ T7909] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1218.885351][ T7909] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1218.893902][ T7909] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 03:19:04 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82041f00, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x0) [ 1218.901878][ T7909] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1218.909857][ T7909] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1218.917829][ T7909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1218.925897][ T7909] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1218.933928][ T7909] 03:19:04 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef390000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:04 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefda0a00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:04 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a911fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:04 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) (async) shmctl$SHM_UNLOCK(r0, 0xc) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000180)=""/262) r2 = syz_clone(0x1002000, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000000)="77e47af51e03e1163c44b61edacbff9aa5f74f715f2888e980141f9c80c870078692f019a0cb34c359738a70e300b7a3ea15a8fffbb6b382aefd671792d1b8fc3e9621bf051c6f4913cfff01b3d1cc") capset(&(0x7f0000000080)={0x19971634, r2}, &(0x7f0000000100)={0x9, 0x3, 0x7ff, 0x0, 0x9, 0x101}) (async) capset(&(0x7f0000000080)={0x19971634, r2}, &(0x7f0000000100)={0x9, 0x3, 0x7ff, 0x0, 0x9, 0x101}) mlockall(0x0) (async) mlockall(0x0) shmctl$SHM_UNLOCK(r0, 0xc) r3 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) shmctl$SHM_LOCK(r3, 0xb) [ 1219.096693][ T7919] wireguard12: entered promiscuous mode [ 1219.102420][ T7919] wireguard12: entered allmulticast mode [ 1219.153808][ T7918] wireguard15: entered promiscuous mode [ 1219.159391][ T7918] wireguard15: entered allmulticast mode 03:19:04 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000b00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:04 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef3a0000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1219.291648][ T7931] wireguard12: entered promiscuous mode [ 1219.297406][ T7931] wireguard12: entered allmulticast mode [ 1219.340328][ T7935] wireguard15: entered promiscuous mode [ 1219.346006][ T7935] wireguard15: entered allmulticast mode 03:19:04 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef010b00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:04 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef440000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:04 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 5) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:04 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82043900, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:04 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a91cfbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1219.559062][ T7941] wireguard12: entered promiscuous mode [ 1219.564671][ T7941] wireguard12: entered allmulticast mode [ 1219.607035][ T7943] wireguard15: entered promiscuous mode [ 1219.607138][ T7951] FAULT_INJECTION: forcing a failure. [ 1219.607138][ T7951] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.612633][ T7943] wireguard15: entered allmulticast mode [ 1219.625212][ T7951] CPU: 1 PID: 7951 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1219.625236][ T7951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1219.625247][ T7951] Call Trace: [ 1219.625252][ T7951] [ 1219.625258][ T7951] dump_stack_lvl+0xda/0x130 [ 1219.662149][ T7951] dump_stack+0x15/0x20 [ 1219.666336][ T7951] should_fail_ex+0x21f/0x230 [ 1219.671037][ T7951] ? skb_clone+0x154/0x1e0 [ 1219.675529][ T7951] __should_failslab+0x92/0xa0 [ 1219.680375][ T7951] should_failslab+0x9/0x20 [ 1219.684902][ T7951] kmem_cache_alloc+0x4e/0x250 [ 1219.689743][ T7951] skb_clone+0x154/0x1e0 [ 1219.694091][ T7951] __netlink_deliver_tap+0x2c0/0x4c0 [ 1219.699401][ T7951] netlink_unicast+0x62f/0x650 [ 1219.704193][ T7951] netlink_sendmsg+0x66e/0x770 [ 1219.708971][ T7951] ? netlink_getsockopt+0x3e0/0x3e0 [ 1219.714176][ T7951] ____sys_sendmsg+0x37c/0x4d0 [ 1219.719026][ T7951] __sys_sendmsg+0x1e9/0x270 [ 1219.723636][ T7951] __x64_sys_sendmsg+0x46/0x50 [ 1219.728455][ T7951] do_syscall_64+0x44/0x110 [ 1219.732970][ T7951] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1219.738880][ T7951] RIP: 0033:0x7efd2e8d0ce9 [ 1219.743324][ T7951] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1219.762946][ T7951] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1219.771378][ T7951] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1219.779384][ T7951] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1219.787362][ T7951] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1219.795374][ T7951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 03:19:04 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) r0 = shmget(0x2, 0x3000, 0x80, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ffb000/0x3000)=nil, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 1219.803354][ T7951] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1219.811339][ T7951] [ 1219.863817][ T7951] wireguard12: entered promiscuous mode [ 1219.869405][ T7951] wireguard12: entered allmulticast mode 03:19:05 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000c00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1220.000602][ T7962] wireguard12: entered promiscuous mode [ 1220.006404][ T7962] wireguard12: entered allmulticast mode 03:19:05 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef480000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:05 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a922fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:05 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x8204c800, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:05 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef010c00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1220.117353][ T7966] wireguard15: entered promiscuous mode [ 1220.122918][ T7966] wireguard15: entered allmulticast mode 03:19:05 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef4c0000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1220.226467][ T7972] wireguard12: entered promiscuous mode [ 1220.232128][ T7972] wireguard12: entered allmulticast mode 03:19:05 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000d00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1220.328597][ T7975] wireguard15: entered promiscuous mode [ 1220.334214][ T7975] wireguard15: entered allmulticast mode 03:19:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 6) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:05 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef500000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1220.506271][ T7979] wireguard12: entered promiscuous mode [ 1220.511918][ T7979] wireguard12: entered allmulticast mode [ 1220.593095][ T7984] FAULT_INJECTION: forcing a failure. [ 1220.593095][ T7984] name failslab, interval 1, probability 0, space 0, times 0 [ 1220.605754][ T7984] CPU: 0 PID: 7984 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1220.616123][ T7984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1220.626184][ T7984] Call Trace: [ 1220.629584][ T7984] [ 1220.632524][ T7984] dump_stack_lvl+0xda/0x130 [ 1220.637147][ T7984] dump_stack+0x15/0x20 [ 1220.641384][ T7984] should_fail_ex+0x21f/0x230 [ 1220.646097][ T7984] ? rtnl_newlink+0x5d/0x1670 [ 1220.650870][ T7984] __should_failslab+0x92/0xa0 [ 1220.655685][ T7984] should_failslab+0x9/0x20 [ 1220.660266][ T7984] __kmem_cache_alloc_node+0x4e/0x210 [ 1220.665767][ T7984] ? rtnl_newlink+0x5d/0x1670 [ 1220.670467][ T7984] kmalloc_trace+0x2a/0xa0 [ 1220.674930][ T7984] rtnl_newlink+0x5d/0x1670 [ 1220.679454][ T7984] ? update_load_avg+0x1f7/0x760 [ 1220.684454][ T7984] ? __switch_to+0x44d/0x9c0 [ 1220.689226][ T7984] ? _raw_spin_unlock+0x26/0x40 [ 1220.694087][ T7984] ? finish_task_switch+0xb4/0x2a0 [ 1220.699239][ T7984] ? __schedule+0x63e/0x8d0 [ 1220.703756][ T7984] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1220.710014][ T7984] ? _raw_spin_unlock+0x26/0x40 [ 1220.714870][ T7984] ? __mutex_lock+0x21c/0x8d0 [ 1220.719572][ T7984] ? rtnl_setlink+0x300/0x300 [ 1220.724274][ T7984] rtnetlink_rcv_msg+0x807/0x8c0 [ 1220.729259][ T7984] ? memcg_account_kmem+0x121/0x140 [ 1220.734585][ T7984] ? __rcu_read_unlock+0x4d/0x70 [ 1220.739584][ T7984] ? mod_objcg_state+0x357/0x580 [ 1220.744566][ T7984] ? slab_post_alloc_hook+0x82/0x2f0 [ 1220.749868][ T7984] ? kmem_cache_free+0x1d9/0x380 [ 1220.754953][ T7984] ? __kfree_skb+0x104/0x140 [ 1220.759548][ T7984] ? nlmon_xmit+0x4b/0x60 [ 1220.763899][ T7984] ? __kfree_skb+0x104/0x140 [ 1220.768540][ T7984] ? consume_skb+0x57/0x180 [ 1220.773052][ T7984] ? nlmon_xmit+0x4b/0x60 [ 1220.777436][ T7984] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1220.782774][ T7984] ? __dev_queue_xmit+0xaae/0x1d80 [ 1220.787932][ T7984] ? ref_tracker_free+0x3a1/0x400 [ 1220.793028][ T7984] netlink_rcv_skb+0x126/0x220 [ 1220.797825][ T7984] ? rtnetlink_bind+0x60/0x60 [ 1220.802522][ T7984] rtnetlink_rcv+0x1c/0x20 [ 1220.806948][ T7984] netlink_unicast+0x589/0x650 [ 1220.811762][ T7984] netlink_sendmsg+0x66e/0x770 [ 1220.816539][ T7984] ? netlink_getsockopt+0x3e0/0x3e0 [ 1220.821745][ T7984] ____sys_sendmsg+0x37c/0x4d0 [ 1220.826565][ T7984] __sys_sendmsg+0x1e9/0x270 [ 1220.831173][ T7984] __x64_sys_sendmsg+0x46/0x50 [ 1220.835938][ T7984] do_syscall_64+0x44/0x110 [ 1220.840466][ T7984] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1220.846382][ T7984] RIP: 0033:0x7efd2e8d0ce9 [ 1220.850795][ T7984] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1220.870467][ T7984] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1220.878901][ T7984] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1220.886878][ T7984] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1220.894857][ T7984] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1220.902832][ T7984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1220.910806][ T7984] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1220.918829][ T7984] [ 1220.933749][ T7986] wireguard15: entered promiscuous mode 03:19:06 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x8204cd02, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x0) [ 1220.939391][ T7986] wireguard15: entered allmulticast mode 03:19:06 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000e00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1221.093235][ T7999] wireguard12: entered promiscuous mode [ 1221.098893][ T7999] wireguard12: entered allmulticast mode 03:19:07 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) (async) r0 = shmget(0x2, 0x3000, 0x80, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ffb000/0x3000)=nil, 0x0) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:19:07 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef600000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:07 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef030e00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:07 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 7) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:07 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x8204ec00, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:07 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a962fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1222.138969][ T8005] __nla_validate_parse: 17 callbacks suppressed [ 1222.138982][ T8005] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1222.172775][ T8005] wireguard12: entered promiscuous mode [ 1222.178494][ T8005] wireguard12: entered allmulticast mode [ 1222.251317][ T8009] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1222.282793][ T8009] wireguard15: entered promiscuous mode [ 1222.288418][ T8009] wireguard15: entered allmulticast mode [ 1222.332661][ T8021] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1222.341927][ T8021] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1222.351146][ T8021] FAULT_INJECTION: forcing a failure. [ 1222.351146][ T8021] name failslab, interval 1, probability 0, space 0, times 0 [ 1222.363744][ T8021] CPU: 0 PID: 8021 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1222.374081][ T8021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1222.384179][ T8021] Call Trace: [ 1222.387449][ T8021] [ 1222.390378][ T8021] dump_stack_lvl+0xda/0x130 [ 1222.395043][ T8021] dump_stack+0x15/0x20 [ 1222.399200][ T8021] should_fail_ex+0x21f/0x230 [ 1222.403970][ T8021] ? kvmalloc_node+0x72/0x160 [ 1222.408654][ T8021] __should_failslab+0x92/0xa0 [ 1222.413518][ T8021] should_failslab+0x9/0x20 [ 1222.418026][ T8021] __kmem_cache_alloc_node+0x4e/0x210 [ 1222.423445][ T8021] ? kvmalloc_node+0x72/0x160 [ 1222.428135][ T8021] __kmalloc_node+0x98/0x1a0 [ 1222.432738][ T8021] kvmalloc_node+0x72/0x160 [ 1222.437376][ T8021] alloc_netdev_mqs+0x89/0x8a0 [ 1222.442184][ T8021] ? wg_netns_pre_exit+0x140/0x140 [ 1222.447368][ T8021] rtnl_create_link+0x23b/0x810 [ 1222.452336][ T8021] rtnl_newlink+0xdff/0x1670 [ 1222.456941][ T8021] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1222.463233][ T8021] ? _raw_spin_unlock+0x26/0x40 [ 1222.468082][ T8021] ? __mutex_lock+0x21c/0x8d0 [ 1222.472842][ T8021] ? rtnl_setlink+0x300/0x300 [ 1222.477596][ T8021] rtnetlink_rcv_msg+0x807/0x8c0 [ 1222.482596][ T8021] ? __rcu_read_unlock+0x4d/0x70 [ 1222.487674][ T8021] ? __rcu_read_unlock+0x4d/0x70 [ 1222.492618][ T8021] ? __refill_stock+0x7f/0xb0 [ 1222.497362][ T8021] ? kmem_cache_free+0x1d9/0x380 [ 1222.502336][ T8021] ? __kfree_skb+0x104/0x140 [ 1222.507032][ T8021] ? nlmon_xmit+0x4b/0x60 [ 1222.511396][ T8021] ? __kfree_skb+0x104/0x140 [ 1222.515992][ T8021] ? consume_skb+0x57/0x180 [ 1222.520571][ T8021] ? nlmon_xmit+0x4b/0x60 [ 1222.524900][ T8021] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1222.530256][ T8021] ? __dev_queue_xmit+0xaae/0x1d80 [ 1222.535370][ T8021] ? ref_tracker_free+0x3a1/0x400 [ 1222.540465][ T8021] netlink_rcv_skb+0x126/0x220 [ 1222.545235][ T8021] ? rtnetlink_bind+0x60/0x60 [ 1222.550011][ T8021] rtnetlink_rcv+0x1c/0x20 [ 1222.554496][ T8021] netlink_unicast+0x589/0x650 [ 1222.559344][ T8021] netlink_sendmsg+0x66e/0x770 [ 1222.564151][ T8021] ? netlink_getsockopt+0x3e0/0x3e0 [ 1222.569357][ T8021] ____sys_sendmsg+0x37c/0x4d0 [ 1222.574135][ T8021] __sys_sendmsg+0x1e9/0x270 [ 1222.578746][ T8021] __x64_sys_sendmsg+0x46/0x50 [ 1222.583509][ T8021] do_syscall_64+0x44/0x110 [ 1222.588054][ T8021] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1222.594006][ T8021] RIP: 0033:0x7efd2e8d0ce9 [ 1222.598487][ T8021] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1222.618102][ T8021] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 03:19:07 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a966fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1222.626553][ T8021] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1222.634616][ T8021] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1222.642661][ T8021] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1222.650677][ T8021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1222.658705][ T8021] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1222.666761][ T8021] 03:19:07 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000f00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:07 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef660000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1222.747763][ T8026] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1222.773723][ T8026] wireguard12: entered promiscuous mode [ 1222.779319][ T8026] wireguard12: entered allmulticast mode [ 1222.865274][ T8032] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1222.908432][ T8032] wireguard15: entered promiscuous mode [ 1222.914118][ T8032] wireguard15: entered allmulticast mode 03:19:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 8) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:08 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x8204ef02, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:08 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef020f00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1223.059370][ T8043] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1223.108551][ T8043] wireguard12: entered promiscuous mode [ 1223.114212][ T8043] wireguard12: entered allmulticast mode [ 1223.153393][ T8044] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1223.162677][ T8044] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1223.171929][ T8044] FAULT_INJECTION: forcing a failure. [ 1223.171929][ T8044] name failslab, interval 1, probability 0, space 0, times 0 [ 1223.184563][ T8044] CPU: 1 PID: 8044 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1223.194980][ T8044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1223.205033][ T8044] Call Trace: [ 1223.208311][ T8044] [ 1223.211252][ T8044] dump_stack_lvl+0xda/0x130 [ 1223.215866][ T8044] dump_stack+0x15/0x20 [ 1223.220039][ T8044] should_fail_ex+0x21f/0x230 [ 1223.224775][ T8044] ? __hw_addr_add_ex+0x13d/0x350 [ 1223.229835][ T8044] __should_failslab+0x92/0xa0 [ 1223.234751][ T8044] should_failslab+0x9/0x20 [ 1223.239344][ T8044] __kmem_cache_alloc_node+0x4e/0x210 [ 1223.244778][ T8044] ? __hw_addr_add_ex+0x13d/0x350 [ 1223.249806][ T8044] kmalloc_trace+0x2a/0xa0 [ 1223.254233][ T8044] __hw_addr_add_ex+0x13d/0x350 [ 1223.259144][ T8044] dev_addr_init+0xb2/0x120 [ 1223.263651][ T8044] ? stack_depot_init+0x4f/0x130 [ 1223.268599][ T8044] alloc_netdev_mqs+0x1cc/0x8a0 [ 1223.273499][ T8044] ? wg_netns_pre_exit+0x140/0x140 [ 1223.278708][ T8044] rtnl_create_link+0x23b/0x810 [ 1223.283579][ T8044] rtnl_newlink+0xdff/0x1670 [ 1223.288347][ T8044] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1223.294602][ T8044] ? _raw_spin_unlock+0x26/0x40 [ 1223.299467][ T8044] ? __mutex_lock+0x21c/0x8d0 [ 1223.304159][ T8044] ? rtnl_setlink+0x300/0x300 [ 1223.308902][ T8044] rtnetlink_rcv_msg+0x807/0x8c0 [ 1223.313857][ T8044] ? __rcu_read_unlock+0x4d/0x70 [ 1223.318876][ T8044] ? __rcu_read_unlock+0x4d/0x70 [ 1223.323821][ T8044] ? __refill_stock+0x7f/0xb0 [ 1223.328502][ T8044] ? kmem_cache_free+0x1d9/0x380 [ 1223.333494][ T8044] ? __kfree_skb+0x104/0x140 [ 1223.338085][ T8044] ? nlmon_xmit+0x4b/0x60 [ 1223.342422][ T8044] ? __kfree_skb+0x104/0x140 [ 1223.347029][ T8044] ? consume_skb+0x57/0x180 [ 1223.351533][ T8044] ? nlmon_xmit+0x4b/0x60 [ 1223.355863][ T8044] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1223.361154][ T8044] ? __dev_queue_xmit+0xaae/0x1d80 [ 1223.366307][ T8044] ? ref_tracker_free+0x3a1/0x400 [ 1223.371398][ T8044] netlink_rcv_skb+0x126/0x220 [ 1223.376163][ T8044] ? rtnetlink_bind+0x60/0x60 [ 1223.380907][ T8044] rtnetlink_rcv+0x1c/0x20 [ 1223.385320][ T8044] netlink_unicast+0x589/0x650 [ 1223.390110][ T8044] netlink_sendmsg+0x66e/0x770 [ 1223.394880][ T8044] ? netlink_getsockopt+0x3e0/0x3e0 [ 1223.400078][ T8044] ____sys_sendmsg+0x37c/0x4d0 [ 1223.404846][ T8044] __sys_sendmsg+0x1e9/0x270 [ 1223.409515][ T8044] __x64_sys_sendmsg+0x46/0x50 [ 1223.414287][ T8044] do_syscall_64+0x44/0x110 [ 1223.418857][ T8044] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1223.424777][ T8044] RIP: 0033:0x7efd2e8d0ce9 [ 1223.429194][ T8044] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 03:19:08 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) shmget(0x2, 0x3000, 0x80, &(0x7f0000ffc000/0x3000)=nil) (async) r0 = shmget(0x2, 0x3000, 0x80, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ffb000/0x3000)=nil, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:19:08 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef680000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:08 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a970fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1223.448807][ T8044] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1223.457215][ T8044] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1223.465190][ T8044] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1223.473159][ T8044] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1223.481168][ T8044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1223.489142][ T8044] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1223.497121][ T8044] [ 1223.521913][ T8052] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1223.560070][ T8052] wireguard15: entered promiscuous mode [ 1223.565802][ T8052] wireguard15: entered allmulticast mode 03:19:08 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef740f00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1223.656549][ T8061] wireguard12: entered promiscuous mode [ 1223.662133][ T8061] wireguard12: entered allmulticast mode 03:19:08 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef6c0000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:08 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef001100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 9) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1223.842267][ T8067] wireguard15: entered promiscuous mode [ 1223.847873][ T8067] wireguard15: entered allmulticast mode 03:19:09 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a9fbfbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1223.896244][ T8070] wireguard12: entered promiscuous mode [ 1223.901888][ T8070] wireguard12: entered allmulticast mode [ 1223.955019][ T8075] FAULT_INJECTION: forcing a failure. [ 1223.955019][ T8075] name failslab, interval 1, probability 0, space 0, times 0 [ 1223.967711][ T8075] CPU: 1 PID: 8075 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1223.978123][ T8075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1223.988184][ T8075] Call Trace: [ 1223.991464][ T8075] [ 1223.994400][ T8075] dump_stack_lvl+0xda/0x130 [ 1223.999045][ T8075] dump_stack+0x15/0x20 03:19:09 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000000)="83d652e405ce29cc20242d1481c6da190f4196211d640a927ca4fd7acf0639d69217912078a40c327cb731d1084144a1f7192bff7f1711748ef4df0e353b9a382d8cd0755c9782e79c930dc99fd47e98f3e82c0a9ca11aa87c706df27cc140b6e749259e82722d902a383b86f339a81b60b7eed01263d61b9c11c75222c71db3ac6c6ec97e759ea89fe10a883404fa12ce3f6f7218c8c42b3b8c822d12b0871ea60a176d95299063e548059b8b24eb9bcba41f1f7c248d8b56153c445ba785c1652b1b55c8ef9ec176a0797c088e7e8da1631a9f78b457238340a57c3405c84ab74047", 0xe3, 0x0, 0x0, &(0x7f0000000200)) [ 1224.003213][ T8075] should_fail_ex+0x21f/0x230 [ 1224.007959][ T8075] ? kvmalloc_node+0x72/0x160 [ 1224.012642][ T8075] __should_failslab+0x92/0xa0 [ 1224.017439][ T8075] should_failslab+0x9/0x20 [ 1224.022031][ T8075] __kmem_cache_alloc_node+0x4e/0x210 [ 1224.027414][ T8075] ? kvmalloc_node+0x72/0x160 [ 1224.032103][ T8075] __kmalloc_node+0x98/0x1a0 [ 1224.036730][ T8075] ? dev_addr_init+0xf2/0x120 [ 1224.041415][ T8075] kvmalloc_node+0x72/0x160 [ 1224.045926][ T8075] alloc_netdev_mqs+0x552/0x8a0 [ 1224.050819][ T8075] rtnl_create_link+0x23b/0x810 03:19:09 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x8204fc00, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x0) [ 1224.055734][ T8075] rtnl_newlink+0xdff/0x1670 [ 1224.060343][ T8075] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1224.066588][ T8075] ? _raw_spin_unlock+0x26/0x40 [ 1224.071447][ T8075] ? __mutex_lock+0x21c/0x8d0 [ 1224.076209][ T8075] ? rtnl_setlink+0x300/0x300 [ 1224.080972][ T8075] rtnetlink_rcv_msg+0x807/0x8c0 [ 1224.085974][ T8075] ? memcg_list_lru_alloc+0xd5/0x750 [ 1224.091281][ T8075] ? mod_objcg_state+0x357/0x580 [ 1224.096291][ T8075] ? slab_post_alloc_hook+0x82/0x2f0 [ 1224.101682][ T8075] ? kmem_cache_free+0x1d9/0x380 [ 1224.106698][ T8075] ? __kfree_skb+0x104/0x140 [ 1224.111294][ T8075] ? nlmon_xmit+0x4b/0x60 [ 1224.115698][ T8075] ? __kfree_skb+0x104/0x140 [ 1224.120324][ T8075] ? consume_skb+0x57/0x180 [ 1224.124830][ T8075] ? nlmon_xmit+0x4b/0x60 [ 1224.129218][ T8075] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1224.134540][ T8075] ? __dev_queue_xmit+0xaae/0x1d80 [ 1224.139661][ T8075] ? ref_tracker_free+0x3a1/0x400 [ 1224.144693][ T8075] netlink_rcv_skb+0x126/0x220 [ 1224.149537][ T8075] ? rtnetlink_bind+0x60/0x60 [ 1224.154266][ T8075] rtnetlink_rcv+0x1c/0x20 [ 1224.158693][ T8075] netlink_unicast+0x589/0x650 [ 1224.163469][ T8075] netlink_sendmsg+0x66e/0x770 [ 1224.168243][ T8075] ? netlink_getsockopt+0x3e0/0x3e0 [ 1224.173444][ T8075] ____sys_sendmsg+0x37c/0x4d0 [ 1224.178304][ T8075] __sys_sendmsg+0x1e9/0x270 [ 1224.182922][ T8075] __x64_sys_sendmsg+0x46/0x50 [ 1224.187696][ T8075] do_syscall_64+0x44/0x110 [ 1224.192295][ T8075] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1224.198212][ T8075] RIP: 0033:0x7efd2e8d0ce9 [ 1224.202621][ T8075] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1224.222255][ T8075] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1224.230864][ T8075] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1224.238824][ T8075] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1224.246786][ T8075] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1224.254793][ T8075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1224.262937][ T8075] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1224.270972][ T8075] 03:19:09 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef740000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1224.440813][ T8090] wireguard15: entered promiscuous mode [ 1224.446417][ T8090] wireguard15: entered allmulticast mode 03:19:09 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef001200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:09 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef780000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1224.610019][ T8094] wireguard12: entered promiscuous mode [ 1224.615677][ T8094] wireguard12: entered allmulticast mode 03:19:09 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x2, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 10) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:09 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a91010bca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1224.695750][ T8097] wireguard15: entered promiscuous mode [ 1224.701455][ T8097] wireguard15: entered allmulticast mode [ 1224.801056][ T8106] FAULT_INJECTION: forcing a failure. [ 1224.801056][ T8106] name failslab, interval 1, probability 0, space 0, times 0 [ 1224.813798][ T8106] CPU: 1 PID: 8106 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1224.824260][ T8106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1224.834313][ T8106] Call Trace: [ 1224.837593][ T8106] [ 1224.840524][ T8106] dump_stack_lvl+0xda/0x130 [ 1224.845219][ T8106] dump_stack+0x15/0x20 [ 1224.849393][ T8106] should_fail_ex+0x21f/0x230 [ 1224.854178][ T8106] ? kvmalloc_node+0x72/0x160 [ 1224.858874][ T8106] __should_failslab+0x92/0xa0 [ 1224.863665][ T8106] should_failslab+0x9/0x20 [ 1224.868220][ T8106] __kmem_cache_alloc_node+0x4e/0x210 [ 1224.873677][ T8106] ? kvmalloc_node+0x72/0x160 [ 1224.878425][ T8106] __kmalloc_node+0x98/0x1a0 [ 1224.883077][ T8106] ? dev_addr_init+0xf2/0x120 [ 1224.887781][ T8106] kvmalloc_node+0x72/0x160 [ 1224.892471][ T8106] alloc_netdev_mqs+0x6d9/0x8a0 [ 1224.897383][ T8106] rtnl_create_link+0x23b/0x810 [ 1224.902287][ T8106] rtnl_newlink+0xdff/0x1670 [ 1224.906955][ T8106] ? security_capable+0x5e/0x80 [ 1224.911849][ T8106] ? ns_capable+0x7c/0xb0 [ 1224.916248][ T8106] ? rtnl_setlink+0x300/0x300 [ 1224.921056][ T8106] rtnetlink_rcv_msg+0x807/0x8c0 [ 1224.926061][ T8106] ? memcg_list_lru_alloc+0xd5/0x750 [ 1224.931390][ T8106] ? mod_objcg_state+0x357/0x580 [ 1224.936416][ T8106] ? slab_post_alloc_hook+0x82/0x2f0 [ 1224.941718][ T8106] ? kmem_cache_free+0x1d9/0x380 [ 1224.946724][ T8106] ? __kfree_skb+0x104/0x140 [ 1224.951323][ T8106] ? nlmon_xmit+0x4b/0x60 [ 1224.955703][ T8106] ? __kfree_skb+0x104/0x140 [ 1224.960316][ T8106] ? consume_skb+0x57/0x180 [ 1224.964825][ T8106] ? nlmon_xmit+0x4b/0x60 [ 1224.969162][ T8106] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1224.974495][ T8106] ? __dev_queue_xmit+0xaae/0x1d80 [ 1224.979635][ T8106] ? ref_tracker_free+0x3a1/0x400 [ 1224.984750][ T8106] netlink_rcv_skb+0x126/0x220 [ 1224.989577][ T8106] ? rtnetlink_bind+0x60/0x60 [ 1224.994271][ T8106] rtnetlink_rcv+0x1c/0x20 [ 1224.998733][ T8106] netlink_unicast+0x589/0x650 [ 1225.003572][ T8106] netlink_sendmsg+0x66e/0x770 [ 1225.008348][ T8106] ? netlink_getsockopt+0x3e0/0x3e0 [ 1225.013602][ T8106] ____sys_sendmsg+0x37c/0x4d0 [ 1225.018390][ T8106] __sys_sendmsg+0x1e9/0x270 [ 1225.023019][ T8106] __x64_sys_sendmsg+0x46/0x50 [ 1225.027786][ T8106] do_syscall_64+0x44/0x110 [ 1225.032318][ T8106] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1225.038310][ T8106] RIP: 0033:0x7efd2e8d0ce9 [ 1225.042729][ T8106] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1225.062345][ T8106] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1225.070802][ T8106] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1225.078784][ T8106] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1225.086754][ T8106] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1225.094786][ T8106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1225.102764][ T8106] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1225.110812][ T8106] 03:19:10 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef021400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:10 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef7a0000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1225.255006][ T8115] wireguard12: entered promiscuous mode [ 1225.260623][ T8115] wireguard12: entered allmulticast mode 03:19:10 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x4, 0x0, 0x0, 0x0) mlockall(0x0) [ 1225.347124][ T8116] wireguard15: entered promiscuous mode [ 1225.352739][ T8116] wireguard15: entered allmulticast mode 03:19:10 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef021500000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1225.576083][ T8124] wireguard12: entered promiscuous mode [ 1225.581663][ T8124] wireguard12: entered allmulticast mode 03:19:11 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000000)="83d652e405ce29cc20242d1481c6da190f4196211d640a927ca4fd7acf0639d69217912078a40c327cb731d1084144a1f7192bff7f1711748ef4df0e353b9a382d8cd0755c9782e79c930dc99fd47e98f3e82c0a9ca11aa87c706df27cc140b6e749259e82722d902a383b86f339a81b60b7eed01263d61b9c11c75222c71db3ac6c6ec97e759ea89fe10a883404fa12ce3f6f7218c8c42b3b8c822d12b0871ea60a176d95299063e548059b8b24eb9bcba41f1f7c248d8b56153c445ba785c1652b1b55c8ef9ec176a0797c088e7e8da1631a9f78b457238340a57c3405c84ab74047", 0xe3, 0x0, 0x0, &(0x7f0000000200)) 03:19:11 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a91062bca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:11 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef930000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:11 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 11) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:11 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef211500000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:11 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x8, 0x0, 0x0, 0x0) mlockall(0x0) [ 1226.225315][ T8134] wireguard15: entered promiscuous mode [ 1226.230905][ T8134] wireguard15: entered allmulticast mode [ 1226.306104][ T8140] wireguard12: entered promiscuous mode [ 1226.311691][ T8140] wireguard12: entered allmulticast mode [ 1226.355080][ T8145] wireguard13: entered promiscuous mode [ 1226.360718][ T8145] wireguard13: entered allmulticast mode 03:19:11 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefa40000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:11 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef211600000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1226.515079][ T8156] wireguard12: entered promiscuous mode [ 1226.520773][ T8156] wireguard12: entered allmulticast mode [ 1226.544140][ T8154] wireguard15: entered promiscuous mode [ 1226.549719][ T8154] wireguard15: entered allmulticast mode 03:19:11 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7305ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:11 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef211700000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:11 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefbd0000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1226.742830][ T8168] wireguard15: entered promiscuous mode [ 1226.748490][ T8168] wireguard15: entered allmulticast mode 03:19:11 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x9, 0x0, 0x0, 0x0) mlockall(0x0) [ 1226.787140][ T8166] wireguard12: entered promiscuous mode [ 1226.792802][ T8166] wireguard12: entered allmulticast mode 03:19:12 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef031c00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:12 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7306ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:12 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 12) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:12 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x11, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:12 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefc80000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:12 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000000)="83d652e405ce29cc20242d1481c6da190f4196211d640a927ca4fd7acf0639d69217912078a40c327cb731d1084144a1f7192bff7f1711748ef4df0e353b9a382d8cd0755c9782e79c930dc99fd47e98f3e82c0a9ca11aa87c706df27cc140b6e749259e82722d902a383b86f339a81b60b7eed01263d61b9c11c75222c71db3ac6c6ec97e759ea89fe10a883404fa12ce3f6f7218c8c42b3b8c822d12b0871ea60a176d95299063e548059b8b24eb9bcba41f1f7c248d8b56153c445ba785c1652b1b55c8ef9ec176a0797c088e7e8da1631a9f78b457238340a57c3405c84ab74047", 0xe3, 0x0, 0x0, &(0x7f0000000200)) shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000000)="83d652e405ce29cc20242d1481c6da190f4196211d640a927ca4fd7acf0639d69217912078a40c327cb731d1084144a1f7192bff7f1711748ef4df0e353b9a382d8cd0755c9782e79c930dc99fd47e98f3e82c0a9ca11aa87c706df27cc140b6e749259e82722d902a383b86f339a81b60b7eed01263d61b9c11c75222c71db3ac6c6ec97e759ea89fe10a883404fa12ce3f6f7218c8c42b3b8c822d12b0871ea60a176d95299063e548059b8b24eb9bcba41f1f7c248d8b56153c445ba785c1652b1b55c8ef9ec176a0797c088e7e8da1631a9f78b457238340a57c3405c84ab74047", 0xe3, 0x0, 0x0, &(0x7f0000000200)) (async) [ 1227.150431][ T8186] wireguard15: entered promiscuous mode [ 1227.156036][ T8186] wireguard15: entered allmulticast mode [ 1227.180608][ T8185] __nla_validate_parse: 22 callbacks suppressed [ 1227.180620][ T8185] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1227.269033][ T8185] wireguard12: entered promiscuous mode [ 1227.274723][ T8185] wireguard12: entered allmulticast mode [ 1227.288718][ T8192] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1227.297965][ T8192] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1227.310650][ T8192] wireguard14: entered promiscuous mode [ 1227.316335][ T8192] wireguard14: entered allmulticast mode 03:19:12 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefd80000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:12 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef001d00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1227.514668][ T8202] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1227.537961][ T8202] wireguard15: entered promiscuous mode [ 1227.543647][ T8202] wireguard15: entered allmulticast mode [ 1227.569724][ T8204] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1227.584074][ T8204] wireguard12: entered promiscuous mode [ 1227.589728][ T8204] wireguard12: entered allmulticast mode 03:19:12 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001feff60000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:12 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef002000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1227.785137][ T8210] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1227.815070][ T8210] wireguard15: entered promiscuous mode [ 1227.820653][ T8210] wireguard15: entered allmulticast mode 03:19:13 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 13) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:13 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7307ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1227.937604][ T8212] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1227.991352][ T8212] wireguard12: entered promiscuous mode [ 1227.997111][ T8212] wireguard12: entered allmulticast mode [ 1228.029562][ T8219] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1228.038831][ T8219] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1228.048138][ T8219] FAULT_INJECTION: forcing a failure. [ 1228.048138][ T8219] name failslab, interval 1, probability 0, space 0, times 0 [ 1228.060771][ T8219] CPU: 0 PID: 8219 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1228.071179][ T8219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1228.081242][ T8219] Call Trace: [ 1228.084524][ T8219] [ 1228.087532][ T8219] dump_stack_lvl+0xda/0x130 [ 1228.092211][ T8219] dump_stack+0x15/0x20 [ 1228.096398][ T8219] should_fail_ex+0x21f/0x230 [ 1228.101125][ T8219] ? alloc_workqueue+0x102/0xc30 [ 1228.106161][ T8219] __should_failslab+0x92/0xa0 [ 1228.110946][ T8219] should_failslab+0x9/0x20 [ 1228.115464][ T8219] __kmem_cache_alloc_node+0x4e/0x210 [ 1228.120891][ T8219] ? alloc_workqueue+0x102/0xc30 [ 1228.125888][ T8219] kmalloc_trace+0x2a/0xa0 [ 1228.130425][ T8219] alloc_workqueue+0x102/0xc30 [ 1228.135206][ T8219] wg_newlink+0x261/0x580 [ 1228.139539][ T8219] ? rtnl_create_link+0x7f5/0x810 [ 1228.144582][ T8219] ? wg_setup+0x1d0/0x1d0 [ 1228.148961][ T8219] rtnl_newlink+0xee5/0x1670 [ 1228.153636][ T8219] ? security_capable+0x5e/0x80 [ 1228.159194][ T8219] ? ns_capable+0x7c/0xb0 [ 1228.163580][ T8219] ? rtnl_setlink+0x300/0x300 [ 1228.168272][ T8219] rtnetlink_rcv_msg+0x807/0x8c0 [ 1228.173289][ T8219] ? memcg_list_lru_alloc+0xd5/0x750 [ 1228.178593][ T8219] ? mod_objcg_state+0x357/0x580 [ 1228.183553][ T8219] ? slab_post_alloc_hook+0x82/0x2f0 [ 1228.189113][ T8219] ? kmem_cache_free+0x1d9/0x380 [ 1228.194115][ T8219] ? __kfree_skb+0x104/0x140 [ 1228.198701][ T8219] ? nlmon_xmit+0x4b/0x60 [ 1228.203037][ T8219] ? __kfree_skb+0x104/0x140 [ 1228.207632][ T8219] ? consume_skb+0x57/0x180 [ 1228.212199][ T8219] ? nlmon_xmit+0x4b/0x60 [ 1228.216540][ T8219] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1228.221837][ T8219] ? __dev_queue_xmit+0xaae/0x1d80 [ 1228.227064][ T8219] ? ref_tracker_free+0x3a1/0x400 [ 1228.232104][ T8219] netlink_rcv_skb+0x126/0x220 [ 1228.236908][ T8219] ? rtnetlink_bind+0x60/0x60 [ 1228.241606][ T8219] rtnetlink_rcv+0x1c/0x20 [ 1228.246025][ T8219] netlink_unicast+0x589/0x650 [ 1228.250848][ T8219] netlink_sendmsg+0x66e/0x770 [ 1228.255697][ T8219] ? netlink_getsockopt+0x3e0/0x3e0 [ 1228.260940][ T8219] ____sys_sendmsg+0x37c/0x4d0 [ 1228.265708][ T8219] __sys_sendmsg+0x1e9/0x270 [ 1228.270639][ T8219] __x64_sys_sendmsg+0x46/0x50 [ 1228.275444][ T8219] do_syscall_64+0x44/0x110 [ 1228.280042][ T8219] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1228.286002][ T8219] RIP: 0033:0x7efd2e8d0ce9 [ 1228.290411][ T8219] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1228.310087][ T8219] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1228.318588][ T8219] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1228.326737][ T8219] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1228.334714][ T8219] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1228.342756][ T8219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1228.350734][ T8219] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1228.358713][ T8219] 03:19:13 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x1d, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:13 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001feffa0000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:13 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef012100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:13 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7309ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:13 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 14) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:13 executing program 4: shmctl$IPC_RMID(0x0, 0x0) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000000)=""/46) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 1228.836673][ T8233] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1228.879036][ T8233] wireguard15: entered promiscuous mode [ 1228.884793][ T8233] wireguard15: entered allmulticast mode [ 1228.922142][ T8234] wireguard12: entered promiscuous mode [ 1228.927748][ T8234] wireguard12: entered allmulticast mode [ 1228.971522][ T8241] FAULT_INJECTION: forcing a failure. [ 1228.971522][ T8241] name failslab, interval 1, probability 0, space 0, times 0 [ 1228.984188][ T8241] CPU: 1 PID: 8241 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1228.994594][ T8241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1229.004739][ T8241] Call Trace: [ 1229.008022][ T8241] [ 1229.010954][ T8241] dump_stack_lvl+0xda/0x130 [ 1229.015692][ T8241] dump_stack+0x15/0x20 [ 1229.019866][ T8241] should_fail_ex+0x21f/0x230 [ 1229.024633][ T8241] ? alloc_workqueue+0x4cc/0xc30 [ 1229.029594][ T8241] __should_failslab+0x92/0xa0 [ 1229.034402][ T8241] should_failslab+0x9/0x20 [ 1229.039051][ T8241] kmem_cache_alloc_node+0x52/0x280 [ 1229.044261][ T8241] alloc_workqueue+0x4cc/0xc30 [ 1229.049085][ T8241] wg_newlink+0x261/0x580 [ 1229.053429][ T8241] ? rtnl_create_link+0x7f5/0x810 [ 1229.058544][ T8241] ? wg_setup+0x1d0/0x1d0 [ 1229.062959][ T8241] rtnl_newlink+0xee5/0x1670 [ 1229.067580][ T8241] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1229.073906][ T8241] ? _raw_spin_unlock+0x26/0x40 [ 1229.078795][ T8241] ? __mutex_lock+0x21c/0x8d0 [ 1229.083539][ T8241] ? rtnl_setlink+0x300/0x300 [ 1229.088239][ T8241] rtnetlink_rcv_msg+0x807/0x8c0 [ 1229.093199][ T8241] ? __rcu_read_unlock+0x4d/0x70 [ 1229.098186][ T8241] ? __rcu_read_unlock+0x4d/0x70 [ 1229.103212][ T8241] ? __refill_stock+0x7f/0xb0 [ 1229.107971][ T8241] ? kmem_cache_free+0x1d9/0x380 [ 1229.112925][ T8241] ? __kfree_skb+0x104/0x140 [ 1229.117575][ T8241] ? nlmon_xmit+0x4b/0x60 [ 1229.122035][ T8241] ? __kfree_skb+0x104/0x140 [ 1229.126629][ T8241] ? consume_skb+0x57/0x180 [ 1229.131172][ T8241] ? nlmon_xmit+0x4b/0x60 [ 1229.135509][ T8241] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1229.140859][ T8241] ? __dev_queue_xmit+0xaae/0x1d80 [ 1229.146035][ T8241] ? ref_tracker_free+0x3a1/0x400 [ 1229.151066][ T8241] netlink_rcv_skb+0x126/0x220 [ 1229.155843][ T8241] ? rtnetlink_bind+0x60/0x60 [ 1229.160551][ T8241] rtnetlink_rcv+0x1c/0x20 [ 1229.165142][ T8241] netlink_unicast+0x589/0x650 [ 1229.170042][ T8241] netlink_sendmsg+0x66e/0x770 [ 1229.174808][ T8241] ? netlink_getsockopt+0x3e0/0x3e0 [ 1229.180013][ T8241] ____sys_sendmsg+0x37c/0x4d0 [ 1229.184782][ T8241] __sys_sendmsg+0x1e9/0x270 [ 1229.189398][ T8241] __x64_sys_sendmsg+0x46/0x50 [ 1229.194222][ T8241] do_syscall_64+0x44/0x110 [ 1229.198889][ T8241] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1229.204801][ T8241] RIP: 0033:0x7efd2e8d0ce9 [ 1229.209226][ T8241] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1229.228911][ T8241] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1229.237341][ T8241] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1229.245331][ T8241] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1229.253312][ T8241] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1229.261292][ T8241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1229.269354][ T8241] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1229.277335][ T8241] 03:19:14 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001feffc0000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:14 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef152100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1229.410491][ T8252] wireguard12: entered promiscuous mode [ 1229.416121][ T8252] wireguard12: entered allmulticast mode [ 1229.480484][ T8250] wireguard15: entered promiscuous mode [ 1229.486174][ T8250] wireguard15: entered allmulticast mode 03:19:14 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df730dad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:14 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef060100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:14 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 15) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:14 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef162100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1229.697231][ T8261] wireguard15: entered promiscuous mode [ 1229.702842][ T8261] wireguard15: entered allmulticast mode [ 1229.793851][ T8266] wireguard12: entered promiscuous mode [ 1229.799437][ T8266] wireguard12: entered allmulticast mode [ 1229.846212][ T8270] FAULT_INJECTION: forcing a failure. [ 1229.846212][ T8270] name failslab, interval 1, probability 0, space 0, times 0 [ 1229.858879][ T8270] CPU: 0 PID: 8270 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1229.869201][ T8270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1229.879265][ T8270] Call Trace: [ 1229.882545][ T8270] [ 1229.885476][ T8270] dump_stack_lvl+0xda/0x130 [ 1229.890108][ T8270] dump_stack+0x15/0x20 [ 1229.894278][ T8270] should_fail_ex+0x21f/0x230 [ 1229.899047][ T8270] ? alloc_workqueue+0x4cc/0xc30 [ 1229.904012][ T8270] __should_failslab+0x92/0xa0 [ 1229.908864][ T8270] should_failslab+0x9/0x20 [ 1229.913381][ T8270] kmem_cache_alloc_node+0x52/0x280 [ 1229.918668][ T8270] ? pwq_adjust_max_active+0x32f/0x350 [ 1229.924253][ T8270] alloc_workqueue+0x4cc/0xc30 [ 1229.929044][ T8270] wg_newlink+0x261/0x580 [ 1229.933400][ T8270] ? rtnl_create_link+0x7f5/0x810 [ 1229.938437][ T8270] ? wg_setup+0x1d0/0x1d0 [ 1229.942874][ T8270] rtnl_newlink+0xee5/0x1670 [ 1229.947546][ T8270] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1229.953860][ T8270] ? _raw_spin_unlock+0x26/0x40 [ 1229.958775][ T8270] ? __mutex_lock+0x21c/0x8d0 [ 1229.963467][ T8270] ? rtnl_setlink+0x300/0x300 [ 1229.968164][ T8270] rtnetlink_rcv_msg+0x807/0x8c0 [ 1229.973107][ T8270] ? memcg_list_lru_alloc+0xd5/0x750 [ 1229.978414][ T8270] ? mod_objcg_state+0x357/0x580 [ 1229.983774][ T8270] ? slab_post_alloc_hook+0x82/0x2f0 [ 1229.989073][ T8270] ? kmem_cache_free+0x1d9/0x380 [ 1229.994026][ T8270] ? __kfree_skb+0x104/0x140 [ 1229.998626][ T8270] ? nlmon_xmit+0x4b/0x60 [ 1230.002968][ T8270] ? __kfree_skb+0x104/0x140 [ 1230.007600][ T8270] ? consume_skb+0x57/0x180 [ 1230.012201][ T8270] ? nlmon_xmit+0x4b/0x60 [ 1230.016536][ T8270] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1230.021985][ T8270] ? __dev_queue_xmit+0xaae/0x1d80 [ 1230.027199][ T8270] ? ref_tracker_free+0x3a1/0x400 [ 1230.032233][ T8270] netlink_rcv_skb+0x126/0x220 [ 1230.037076][ T8270] ? rtnetlink_bind+0x60/0x60 [ 1230.041773][ T8270] rtnetlink_rcv+0x1c/0x20 [ 1230.046230][ T8270] netlink_unicast+0x589/0x650 [ 1230.051009][ T8270] netlink_sendmsg+0x66e/0x770 [ 1230.055775][ T8270] ? netlink_getsockopt+0x3e0/0x3e0 [ 1230.061015][ T8270] ____sys_sendmsg+0x37c/0x4d0 [ 1230.065791][ T8270] __sys_sendmsg+0x1e9/0x270 [ 1230.070466][ T8270] __x64_sys_sendmsg+0x46/0x50 [ 1230.075329][ T8270] do_syscall_64+0x44/0x110 [ 1230.079966][ T8270] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1230.085931][ T8270] RIP: 0033:0x7efd2e8d0ce9 [ 1230.090422][ T8270] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1230.110031][ T8270] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1230.118495][ T8270] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1230.126560][ T8270] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1230.134538][ T8270] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1230.142513][ T8270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1230.150485][ T8270] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1230.158530][ T8270] 03:19:15 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x39, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:15 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0b0100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:15 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef172100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1230.333539][ T8274] wireguard15: entered promiscuous mode [ 1230.339148][ T8274] wireguard15: entered allmulticast mode [ 1230.403797][ T8279] wireguard12: entered promiscuous mode [ 1230.409404][ T8279] wireguard12: entered allmulticast mode 03:19:15 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef1a0100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:15 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 16) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1230.612185][ T8284] wireguard15: entered promiscuous mode [ 1230.617897][ T8284] wireguard15: entered allmulticast mode [ 1230.665789][ T8289] FAULT_INJECTION: forcing a failure. [ 1230.665789][ T8289] name failslab, interval 1, probability 0, space 0, times 0 [ 1230.678492][ T8289] CPU: 0 PID: 8289 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1230.688847][ T8289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1230.698908][ T8289] Call Trace: [ 1230.702213][ T8289] [ 1230.705142][ T8289] dump_stack_lvl+0xda/0x130 [ 1230.709750][ T8289] dump_stack+0x15/0x20 [ 1230.713934][ T8289] should_fail_ex+0x21f/0x230 [ 1230.718794][ T8289] ? alloc_workqueue+0x102/0xc30 [ 1230.723737][ T8289] __should_failslab+0x92/0xa0 [ 1230.728525][ T8289] should_failslab+0x9/0x20 [ 1230.733092][ T8289] __kmem_cache_alloc_node+0x4e/0x210 [ 1230.738475][ T8289] ? _raw_spin_lock_irqsave+0x3c/0xa0 [ 1230.743911][ T8289] ? alloc_workqueue+0x102/0xc30 [ 1230.748861][ T8289] kmalloc_trace+0x2a/0xa0 [ 1230.753283][ T8289] alloc_workqueue+0x102/0xc30 [ 1230.758120][ T8289] wg_newlink+0x2a0/0x580 [ 1230.762464][ T8289] ? rtnl_create_link+0x7f5/0x810 [ 1230.767585][ T8289] ? wg_setup+0x1d0/0x1d0 [ 1230.772370][ T8289] rtnl_newlink+0xee5/0x1670 [ 1230.776998][ T8289] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1230.783252][ T8289] ? _raw_spin_unlock+0x26/0x40 [ 1230.788102][ T8289] ? __mutex_lock+0x21c/0x8d0 [ 1230.792800][ T8289] ? rtnl_setlink+0x300/0x300 [ 1230.797545][ T8289] rtnetlink_rcv_msg+0x807/0x8c0 [ 1230.802485][ T8289] ? memcg_list_lru_alloc+0xd5/0x750 [ 1230.807826][ T8289] ? mod_objcg_state+0x357/0x580 [ 1230.812809][ T8289] ? slab_post_alloc_hook+0x82/0x2f0 [ 1230.818109][ T8289] ? kmem_cache_free+0x1d9/0x380 [ 1230.823064][ T8289] ? __kfree_skb+0x104/0x140 [ 1230.827729][ T8289] ? nlmon_xmit+0x4b/0x60 [ 1230.832064][ T8289] ? __kfree_skb+0x104/0x140 [ 1230.836698][ T8289] ? consume_skb+0x57/0x180 [ 1230.841236][ T8289] ? nlmon_xmit+0x4b/0x60 [ 1230.845570][ T8289] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1230.850865][ T8289] ? __dev_queue_xmit+0xaae/0x1d80 [ 1230.855993][ T8289] ? ref_tracker_free+0x3a1/0x400 [ 1230.861104][ T8289] netlink_rcv_skb+0x126/0x220 [ 1230.865945][ T8289] ? rtnetlink_bind+0x60/0x60 [ 1230.870652][ T8289] rtnetlink_rcv+0x1c/0x20 [ 1230.875075][ T8289] netlink_unicast+0x589/0x650 [ 1230.879874][ T8289] netlink_sendmsg+0x66e/0x770 [ 1230.884722][ T8289] ? netlink_getsockopt+0x3e0/0x3e0 [ 1230.889961][ T8289] ____sys_sendmsg+0x37c/0x4d0 [ 1230.894735][ T8289] __sys_sendmsg+0x1e9/0x270 [ 1230.899419][ T8289] __x64_sys_sendmsg+0x46/0x50 [ 1230.904191][ T8289] do_syscall_64+0x44/0x110 [ 1230.908713][ T8289] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1230.914621][ T8289] RIP: 0033:0x7efd2e8d0ce9 [ 1230.919042][ T8289] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1230.938753][ T8289] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1230.947235][ T8289] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1230.955218][ T8289] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1230.963258][ T8289] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1230.971289][ T8289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1230.979324][ T8289] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1230.987321][ T8289] 03:19:16 executing program 4: shmctl$IPC_RMID(0x0, 0x0) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000000)=""/46) (async) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:19:16 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef002400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:16 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef360100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1231.341152][ T8297] wireguard12: entered promiscuous mode [ 1231.346825][ T8297] wireguard12: entered allmulticast mode [ 1231.405208][ T8299] wireguard15: entered promiscuous mode [ 1231.410862][ T8299] wireguard15: entered allmulticast mode 03:19:17 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7313ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 17) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:17 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xc8, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:17 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef002500000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:17 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef440100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1232.097967][ T8311] wireguard15: entered promiscuous mode [ 1232.103556][ T8311] wireguard15: entered allmulticast mode [ 1232.187165][ T8315] wireguard12: entered promiscuous mode [ 1232.192841][ T8315] wireguard12: entered allmulticast mode [ 1232.279334][ T8316] __nla_validate_parse: 18 callbacks suppressed [ 1232.279349][ T8316] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1232.294884][ T8316] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1232.304297][ T8316] FAULT_INJECTION: forcing a failure. [ 1232.304297][ T8316] name failslab, interval 1, probability 0, space 0, times 0 [ 1232.316905][ T8316] CPU: 0 PID: 8316 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1232.327282][ T8316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1232.337341][ T8316] Call Trace: [ 1232.340626][ T8316] [ 1232.343554][ T8316] dump_stack_lvl+0xda/0x130 [ 1232.348243][ T8316] dump_stack+0x15/0x20 [ 1232.352490][ T8316] should_fail_ex+0x21f/0x230 [ 1232.357201][ T8316] ? alloc_workqueue+0x15f/0xc30 [ 1232.362156][ T8316] __should_failslab+0x92/0xa0 [ 1232.366938][ T8316] should_failslab+0x9/0x20 [ 1232.371447][ T8316] __kmem_cache_alloc_node+0x4e/0x210 [ 1232.376826][ T8316] ? alloc_workqueue+0x15f/0xc30 [ 1232.381780][ T8316] kmalloc_trace+0x2a/0xa0 [ 1232.386205][ T8316] alloc_workqueue+0x15f/0xc30 [ 1232.391074][ T8316] wg_newlink+0x2a0/0x580 [ 1232.395511][ T8316] ? rtnl_create_link+0x7f5/0x810 [ 1232.400552][ T8316] ? wg_setup+0x1d0/0x1d0 [ 1232.404958][ T8316] rtnl_newlink+0xee5/0x1670 [ 1232.409565][ T8316] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1232.415836][ T8316] ? _raw_spin_unlock+0x26/0x40 [ 1232.420767][ T8316] ? __mutex_lock+0x21c/0x8d0 [ 1232.425480][ T8316] ? rtnl_setlink+0x300/0x300 [ 1232.430251][ T8316] rtnetlink_rcv_msg+0x807/0x8c0 [ 1232.435200][ T8316] ? memcg_list_lru_alloc+0xd5/0x750 [ 1232.440529][ T8316] ? mod_objcg_state+0x357/0x580 [ 1232.445602][ T8316] ? slab_post_alloc_hook+0x82/0x2f0 [ 1232.450917][ T8316] ? kmem_cache_free+0x1d9/0x380 [ 1232.455869][ T8316] ? __kfree_skb+0x104/0x140 [ 1232.460455][ T8316] ? nlmon_xmit+0x4b/0x60 [ 1232.464858][ T8316] ? __kfree_skb+0x104/0x140 [ 1232.469454][ T8316] ? consume_skb+0x57/0x180 [ 1232.473985][ T8316] ? nlmon_xmit+0x4b/0x60 [ 1232.478325][ T8316] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1232.483669][ T8316] ? __dev_queue_xmit+0xaae/0x1d80 [ 1232.488795][ T8316] ? ref_tracker_free+0x3a1/0x400 [ 1232.493857][ T8316] netlink_rcv_skb+0x126/0x220 [ 1232.498622][ T8316] ? rtnetlink_bind+0x60/0x60 [ 1232.503375][ T8316] rtnetlink_rcv+0x1c/0x20 [ 1232.507849][ T8316] netlink_unicast+0x589/0x650 [ 1232.512630][ T8316] netlink_sendmsg+0x66e/0x770 [ 1232.517426][ T8316] ? netlink_getsockopt+0x3e0/0x3e0 [ 1232.522634][ T8316] ____sys_sendmsg+0x37c/0x4d0 [ 1232.527410][ T8316] __sys_sendmsg+0x1e9/0x270 [ 1232.532016][ T8316] __x64_sys_sendmsg+0x46/0x50 [ 1232.536819][ T8316] do_syscall_64+0x44/0x110 [ 1232.541347][ T8316] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1232.547313][ T8316] RIP: 0033:0x7efd2e8d0ce9 [ 1232.551805][ T8316] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1232.571425][ T8316] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1232.579851][ T8316] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1232.587840][ T8316] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1232.595812][ T8316] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1232.603801][ T8316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1232.611772][ T8316] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1232.619749][ T8316] 03:19:17 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef620100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:17 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef022c00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1232.736863][ T8326] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:19:17 executing program 4: shmctl$IPC_RMID(0x0, 0x0) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) (async) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000000)=""/46) mlockall(0x1) (async) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 1232.797981][ T8326] wireguard15: entered promiscuous mode [ 1232.803569][ T8326] wireguard15: entered allmulticast mode [ 1232.831945][ T8330] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:19:18 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 18) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1232.881575][ T8330] wireguard12: entered promiscuous mode [ 1232.887160][ T8330] wireguard12: entered allmulticast mode 03:19:18 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef720100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:18 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef002d00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1233.011884][ T8338] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1233.062343][ T8338] wireguard15: entered promiscuous mode [ 1233.067982][ T8338] wireguard15: entered allmulticast mode [ 1233.116012][ T8339] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1233.125410][ T8339] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1233.134946][ T8339] FAULT_INJECTION: forcing a failure. [ 1233.134946][ T8339] name failslab, interval 1, probability 0, space 0, times 0 [ 1233.147582][ T8339] CPU: 0 PID: 8339 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1233.157909][ T8339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1233.168015][ T8339] Call Trace: [ 1233.171288][ T8339] [ 1233.174285][ T8339] dump_stack_lvl+0xda/0x130 [ 1233.178909][ T8339] dump_stack+0x15/0x20 [ 1233.183077][ T8339] should_fail_ex+0x21f/0x230 [ 1233.187771][ T8339] ? apply_wqattrs_prepare+0x69/0x4c0 [ 1233.193227][ T8339] __should_failslab+0x92/0xa0 [ 1233.198013][ T8339] should_failslab+0x9/0x20 [ 1233.202524][ T8339] __kmem_cache_alloc_node+0x4e/0x210 [ 1233.208085][ T8339] ? apply_wqattrs_prepare+0x69/0x4c0 [ 1233.213459][ T8339] __kmalloc+0x95/0x1a0 [ 1233.217617][ T8339] apply_wqattrs_prepare+0x69/0x4c0 [ 1233.222863][ T8339] apply_workqueue_attrs+0xa9/0x110 [ 1233.228093][ T8339] alloc_workqueue+0x768/0xc30 [ 1233.232934][ T8339] wg_newlink+0x2a0/0x580 [ 1233.237308][ T8339] ? rtnl_create_link+0x7f5/0x810 [ 1233.242419][ T8339] ? wg_setup+0x1d0/0x1d0 [ 1233.246760][ T8339] rtnl_newlink+0xee5/0x1670 [ 1233.251423][ T8339] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1233.257671][ T8339] ? _raw_spin_unlock+0x26/0x40 [ 1233.262522][ T8339] ? __mutex_lock+0x21c/0x8d0 [ 1233.267266][ T8339] ? rtnl_setlink+0x300/0x300 [ 1233.271967][ T8339] rtnetlink_rcv_msg+0x807/0x8c0 [ 1233.276933][ T8339] ? memcg_list_lru_alloc+0xd5/0x750 [ 1233.282264][ T8339] ? mod_objcg_state+0x357/0x580 [ 1233.287275][ T8339] ? slab_post_alloc_hook+0x82/0x2f0 [ 1233.292594][ T8339] ? kmem_cache_free+0x1d9/0x380 [ 1233.297524][ T8339] ? __kfree_skb+0x104/0x140 [ 1233.302174][ T8339] ? nlmon_xmit+0x4b/0x60 [ 1233.306574][ T8339] ? __kfree_skb+0x104/0x140 [ 1233.311223][ T8339] ? consume_skb+0x57/0x180 [ 1233.315776][ T8339] ? nlmon_xmit+0x4b/0x60 [ 1233.320107][ T8339] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1233.325388][ T8339] ? __dev_queue_xmit+0xaae/0x1d80 [ 1233.330513][ T8339] ? ref_tracker_free+0x3a1/0x400 [ 1233.335605][ T8339] netlink_rcv_skb+0x126/0x220 [ 1233.340355][ T8339] ? rtnetlink_bind+0x60/0x60 [ 1233.345113][ T8339] rtnetlink_rcv+0x1c/0x20 [ 1233.349542][ T8339] netlink_unicast+0x589/0x650 [ 1233.354353][ T8339] netlink_sendmsg+0x66e/0x770 [ 1233.359104][ T8339] ? netlink_getsockopt+0x3e0/0x3e0 [ 1233.364321][ T8339] ____sys_sendmsg+0x37c/0x4d0 [ 1233.369078][ T8339] __sys_sendmsg+0x1e9/0x270 [ 1233.373660][ T8339] __x64_sys_sendmsg+0x46/0x50 [ 1233.378414][ T8339] do_syscall_64+0x44/0x110 [ 1233.383006][ T8339] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1233.388904][ T8339] RIP: 0033:0x7efd2e8d0ce9 [ 1233.393379][ T8339] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1233.412975][ T8339] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1233.421420][ T8339] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1233.429407][ T8339] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1233.437364][ T8339] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1233.445348][ T8339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1233.453339][ T8339] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1233.461373][ T8339] 03:19:18 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xec, 0x0, 0x0, 0x0) mlockall(0x0) [ 1233.534847][ T8342] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1233.565083][ T8342] wireguard12: entered promiscuous mode [ 1233.570730][ T8342] wireguard12: entered allmulticast mode 03:19:19 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7318ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:19 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) shmat(0xffffffffffffffff, &(0x7f0000fff000/0x1000)=nil, 0x4000) 03:19:19 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefa80100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:19 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef012d00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:19 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 19) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1234.342302][ T8359] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:19:19 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xfc, 0x0, 0x0, 0x0) mlockall(0x0) [ 1234.398677][ T8359] wireguard12: entered promiscuous mode [ 1234.404293][ T8359] wireguard12: entered allmulticast mode [ 1234.427046][ T8360] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1234.459325][ T8360] wireguard15: entered promiscuous mode [ 1234.464925][ T8360] wireguard15: entered allmulticast mode [ 1234.506291][ T8365] FAULT_INJECTION: forcing a failure. [ 1234.506291][ T8365] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.518955][ T8365] CPU: 1 PID: 8365 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1234.529404][ T8365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1234.539459][ T8365] Call Trace: [ 1234.542735][ T8365] [ 1234.545664][ T8365] dump_stack_lvl+0xda/0x130 [ 1234.550287][ T8365] dump_stack+0x15/0x20 [ 1234.554448][ T8365] should_fail_ex+0x21f/0x230 [ 1234.559211][ T8365] ? apply_wqattrs_prepare+0x8e/0x4c0 [ 1234.564614][ T8365] __should_failslab+0x92/0xa0 [ 1234.569495][ T8365] should_failslab+0x9/0x20 [ 1234.574064][ T8365] __kmem_cache_alloc_node+0x4e/0x210 [ 1234.579520][ T8365] ? apply_wqattrs_prepare+0x8e/0x4c0 [ 1234.584937][ T8365] kmalloc_trace+0x2a/0xa0 [ 1234.589354][ T8365] apply_wqattrs_prepare+0x8e/0x4c0 [ 1234.594703][ T8365] apply_workqueue_attrs+0xa9/0x110 [ 1234.599920][ T8365] alloc_workqueue+0x768/0xc30 [ 1234.604803][ T8365] wg_newlink+0x2a0/0x580 [ 1234.609183][ T8365] ? rtnl_create_link+0x7f5/0x810 [ 1234.614217][ T8365] ? wg_setup+0x1d0/0x1d0 [ 1234.618544][ T8365] rtnl_newlink+0xee5/0x1670 [ 1234.623191][ T8365] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1234.629522][ T8365] ? _raw_spin_unlock+0x26/0x40 [ 1234.634443][ T8365] ? __mutex_lock+0x21c/0x8d0 [ 1234.639139][ T8365] ? rtnl_setlink+0x300/0x300 [ 1234.643868][ T8365] rtnetlink_rcv_msg+0x807/0x8c0 [ 1234.648803][ T8365] ? memcg_list_lru_alloc+0xd5/0x750 [ 1234.654132][ T8365] ? mod_objcg_state+0x357/0x580 [ 1234.659073][ T8365] ? slab_post_alloc_hook+0x82/0x2f0 [ 1234.664371][ T8365] ? kmem_cache_free+0x1d9/0x380 [ 1234.669447][ T8365] ? __kfree_skb+0x104/0x140 [ 1234.674044][ T8365] ? nlmon_xmit+0x4b/0x60 [ 1234.678374][ T8365] ? __kfree_skb+0x104/0x140 [ 1234.682971][ T8365] ? consume_skb+0x57/0x180 [ 1234.687503][ T8365] ? nlmon_xmit+0x4b/0x60 [ 1234.691844][ T8365] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1234.697149][ T8365] ? __dev_queue_xmit+0xaae/0x1d80 [ 1234.702270][ T8365] ? ref_tracker_free+0x3a1/0x400 [ 1234.707306][ T8365] netlink_rcv_skb+0x126/0x220 [ 1234.712073][ T8365] ? rtnetlink_bind+0x60/0x60 [ 1234.716776][ T8365] rtnetlink_rcv+0x1c/0x20 [ 1234.721225][ T8365] netlink_unicast+0x589/0x650 [ 1234.726006][ T8365] netlink_sendmsg+0x66e/0x770 [ 1234.730802][ T8365] ? netlink_getsockopt+0x3e0/0x3e0 [ 1234.736000][ T8365] ____sys_sendmsg+0x37c/0x4d0 [ 1234.740904][ T8365] __sys_sendmsg+0x1e9/0x270 [ 1234.745503][ T8365] __x64_sys_sendmsg+0x46/0x50 [ 1234.750346][ T8365] do_syscall_64+0x44/0x110 [ 1234.754857][ T8365] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1234.760766][ T8365] RIP: 0033:0x7efd2e8d0ce9 [ 1234.765174][ T8365] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1234.784868][ T8365] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1234.793284][ T8365] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1234.801262][ T8365] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1234.809265][ T8365] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1234.817233][ T8365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1234.825199][ T8365] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1234.833170][ T8365] 03:19:20 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef002f00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:20 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefac0100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1235.004954][ T8377] wireguard12: entered promiscuous mode [ 1235.010560][ T8377] wireguard12: entered allmulticast mode 03:19:20 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) shmat(0xffffffffffffffff, &(0x7f0000fff000/0x1000)=nil, 0x4000) [ 1235.063725][ T8379] wireguard15: entered promiscuous mode [ 1235.069294][ T8379] wireguard15: entered allmulticast mode 03:19:20 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 20) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:20 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefc20100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:20 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef003200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:20 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7328ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1235.249714][ T8392] wireguard15: entered promiscuous mode [ 1235.255350][ T8392] wireguard15: entered allmulticast mode [ 1235.297294][ T8396] FAULT_INJECTION: forcing a failure. [ 1235.297294][ T8396] name failslab, interval 1, probability 0, space 0, times 0 [ 1235.310090][ T8396] CPU: 1 PID: 8396 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1235.320485][ T8396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1235.330572][ T8396] Call Trace: [ 1235.333923][ T8396] [ 1235.336850][ T8396] dump_stack_lvl+0xda/0x130 [ 1235.341453][ T8396] dump_stack+0x15/0x20 [ 1235.345667][ T8396] should_fail_ex+0x21f/0x230 [ 1235.350427][ T8396] ? alloc_unbound_pwq+0x57c/0x710 [ 1235.355540][ T8396] __should_failslab+0x92/0xa0 [ 1235.360328][ T8396] should_failslab+0x9/0x20 [ 1235.364832][ T8396] kmem_cache_alloc_node+0x52/0x280 [ 1235.370055][ T8396] alloc_unbound_pwq+0x57c/0x710 [ 1235.375072][ T8396] apply_wqattrs_prepare+0x219/0x4c0 [ 1235.380410][ T8396] apply_workqueue_attrs+0xa9/0x110 [ 1235.385686][ T8396] alloc_workqueue+0x768/0xc30 [ 1235.390501][ T8396] wg_newlink+0x2a0/0x580 [ 1235.394885][ T8396] ? rtnl_create_link+0x7f5/0x810 [ 1235.399921][ T8396] ? wg_setup+0x1d0/0x1d0 [ 1235.404246][ T8396] rtnl_newlink+0xee5/0x1670 [ 1235.408851][ T8396] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1235.415126][ T8396] ? _raw_spin_unlock+0x26/0x40 [ 1235.420019][ T8396] ? __mutex_lock+0x21c/0x8d0 [ 1235.424709][ T8396] ? rtnl_setlink+0x300/0x300 [ 1235.429472][ T8396] rtnetlink_rcv_msg+0x807/0x8c0 [ 1235.434413][ T8396] ? memcg_list_lru_alloc+0xd5/0x750 [ 1235.439711][ T8396] ? mod_objcg_state+0x357/0x580 [ 1235.444659][ T8396] ? slab_post_alloc_hook+0x82/0x2f0 [ 1235.449967][ T8396] ? kmem_cache_free+0x1d9/0x380 [ 1235.454967][ T8396] ? __kfree_skb+0x104/0x140 [ 1235.459638][ T8396] ? nlmon_xmit+0x4b/0x60 [ 1235.464043][ T8396] ? __kfree_skb+0x104/0x140 [ 1235.468666][ T8396] ? consume_skb+0x57/0x180 [ 1235.473163][ T8396] ? nlmon_xmit+0x4b/0x60 [ 1235.477492][ T8396] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1235.482791][ T8396] ? __dev_queue_xmit+0xaae/0x1d80 [ 1235.488051][ T8396] ? ref_tracker_free+0x3a1/0x400 [ 1235.493122][ T8396] netlink_rcv_skb+0x126/0x220 [ 1235.497889][ T8396] ? rtnetlink_bind+0x60/0x60 [ 1235.502567][ T8396] rtnetlink_rcv+0x1c/0x20 [ 1235.506987][ T8396] netlink_unicast+0x589/0x650 [ 1235.511845][ T8396] netlink_sendmsg+0x66e/0x770 [ 1235.516631][ T8396] ? netlink_getsockopt+0x3e0/0x3e0 [ 1235.521834][ T8396] ____sys_sendmsg+0x37c/0x4d0 [ 1235.526681][ T8396] __sys_sendmsg+0x1e9/0x270 [ 1235.531319][ T8396] __x64_sys_sendmsg+0x46/0x50 [ 1235.536129][ T8396] do_syscall_64+0x44/0x110 [ 1235.540696][ T8396] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1235.546593][ T8396] RIP: 0033:0x7efd2e8d0ce9 [ 1235.551017][ T8396] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1235.570629][ T8396] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1235.579045][ T8396] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1235.587050][ T8396] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1235.597023][ T8396] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1235.604993][ T8396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1235.612972][ T8396] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1235.621014][ T8396] [ 1235.634839][ T8393] wireguard12: entered promiscuous mode [ 1235.640408][ T8393] wireguard12: entered allmulticast mode 03:19:20 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef033400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:20 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefe20100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:20 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x112, 0x0, 0x0, 0x0) mlockall(0x0) [ 1235.867257][ T8404] wireguard12: entered promiscuous mode [ 1235.872840][ T8404] wireguard12: entered allmulticast mode [ 1235.980160][ T8406] wireguard15: entered promiscuous mode [ 1235.985779][ T8406] wireguard15: entered allmulticast mode 03:19:21 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 21) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:21 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef013600000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:21 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001feffa0100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1236.247348][ T8415] FAULT_INJECTION: forcing a failure. [ 1236.247348][ T8415] name failslab, interval 1, probability 0, space 0, times 0 [ 1236.259986][ T8415] CPU: 0 PID: 8415 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1236.270318][ T8415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1236.280376][ T8415] Call Trace: [ 1236.283659][ T8415] [ 1236.286591][ T8415] dump_stack_lvl+0xda/0x130 [ 1236.291198][ T8415] dump_stack+0x15/0x20 [ 1236.295408][ T8415] should_fail_ex+0x21f/0x230 [ 1236.300203][ T8415] ? alloc_unbound_pwq+0x57c/0x710 [ 1236.305327][ T8415] __should_failslab+0x92/0xa0 [ 1236.310125][ T8415] should_failslab+0x9/0x20 [ 1236.314639][ T8415] kmem_cache_alloc_node+0x52/0x280 [ 1236.319966][ T8415] ? alloc_unbound_pwq+0x1f6/0x710 [ 1236.325083][ T8415] alloc_unbound_pwq+0x57c/0x710 [ 1236.330080][ T8415] apply_wqattrs_prepare+0x32e/0x4c0 [ 1236.335476][ T8415] apply_workqueue_attrs+0xa9/0x110 [ 1236.340734][ T8415] alloc_workqueue+0x768/0xc30 [ 1236.345576][ T8415] wg_newlink+0x2a0/0x580 [ 1236.349909][ T8415] ? rtnl_create_link+0x7f5/0x810 [ 1236.355013][ T8415] ? wg_setup+0x1d0/0x1d0 [ 1236.359350][ T8415] rtnl_newlink+0xee5/0x1670 [ 1236.364019][ T8415] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1236.370278][ T8415] ? _raw_spin_unlock+0x26/0x40 [ 1236.375195][ T8415] ? __mutex_lock+0x21c/0x8d0 [ 1236.379932][ T8415] ? rtnl_setlink+0x300/0x300 [ 1236.384636][ T8415] rtnetlink_rcv_msg+0x807/0x8c0 [ 1236.389676][ T8415] ? memcg_list_lru_alloc+0xd5/0x750 [ 1236.394976][ T8415] ? mod_objcg_state+0x357/0x580 [ 1236.399937][ T8415] ? slab_post_alloc_hook+0x82/0x2f0 [ 1236.405289][ T8415] ? try_charge_memcg+0xb49/0xd30 [ 1236.410407][ T8415] ? kmem_cache_free+0x1d9/0x380 [ 1236.415356][ T8415] ? __kfree_skb+0x104/0x140 [ 1236.419949][ T8415] ? nlmon_xmit+0x4b/0x60 [ 1236.424307][ T8415] ? __kfree_skb+0x104/0x140 [ 1236.428961][ T8415] ? consume_skb+0x57/0x180 [ 1236.433464][ T8415] ? nlmon_xmit+0x4b/0x60 [ 1236.437914][ T8415] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1236.443202][ T8415] ? __dev_queue_xmit+0xaae/0x1d80 [ 1236.448314][ T8415] ? ref_tracker_free+0x3a1/0x400 [ 1236.453351][ T8415] netlink_rcv_skb+0x126/0x220 [ 1236.458153][ T8415] ? rtnetlink_bind+0x60/0x60 [ 1236.462836][ T8415] rtnetlink_rcv+0x1c/0x20 [ 1236.467306][ T8415] netlink_unicast+0x589/0x650 [ 1236.472148][ T8415] netlink_sendmsg+0x66e/0x770 [ 1236.476912][ T8415] ? netlink_getsockopt+0x3e0/0x3e0 [ 1236.482177][ T8415] ____sys_sendmsg+0x37c/0x4d0 [ 1236.486944][ T8415] __sys_sendmsg+0x1e9/0x270 [ 1236.491696][ T8415] __x64_sys_sendmsg+0x46/0x50 [ 1236.496466][ T8415] do_syscall_64+0x44/0x110 [ 1236.500998][ T8415] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1236.506911][ T8415] RIP: 0033:0x7efd2e8d0ce9 [ 1236.511329][ T8415] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1236.530990][ T8415] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1236.539401][ T8415] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1236.547448][ T8415] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1236.555420][ T8415] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1236.563468][ T8415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1236.571442][ T8415] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1236.579423][ T8415] [ 1236.615028][ T8419] wireguard15: entered promiscuous mode [ 1236.620594][ T8419] wireguard15: entered allmulticast mode [ 1236.649143][ T8420] wireguard12: entered promiscuous mode [ 1236.654807][ T8420] wireguard12: entered allmulticast mode 03:19:21 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) shmat(0xffffffffffffffff, &(0x7f0000fff000/0x1000)=nil, 0x4000) 03:19:22 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 22) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:22 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef003900000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:22 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001feffc0100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1237.026193][ T8431] wireguard12: entered promiscuous mode [ 1237.031929][ T8431] wireguard12: entered allmulticast mode [ 1237.069176][ T8433] wireguard15: entered promiscuous mode [ 1237.074899][ T8433] wireguard15: entered allmulticast mode [ 1237.111581][ T8436] FAULT_INJECTION: forcing a failure. [ 1237.111581][ T8436] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.124208][ T8436] CPU: 0 PID: 8436 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1237.134617][ T8436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1237.144675][ T8436] Call Trace: [ 1237.147962][ T8436] [ 1237.150899][ T8436] dump_stack_lvl+0xda/0x130 [ 1237.155566][ T8436] dump_stack+0x15/0x20 [ 1237.159783][ T8436] should_fail_ex+0x21f/0x230 [ 1237.164612][ T8436] ? alloc_unbound_pwq+0x57c/0x710 [ 1237.169724][ T8436] __should_failslab+0x92/0xa0 [ 1237.174578][ T8436] should_failslab+0x9/0x20 [ 1237.179160][ T8436] kmem_cache_alloc_node+0x52/0x280 [ 1237.184383][ T8436] alloc_unbound_pwq+0x57c/0x710 [ 1237.189380][ T8436] apply_wqattrs_prepare+0x32e/0x4c0 [ 1237.194682][ T8436] apply_workqueue_attrs+0xa9/0x110 [ 1237.199968][ T8436] alloc_workqueue+0x768/0xc30 [ 1237.204811][ T8436] wg_newlink+0x2a0/0x580 [ 1237.209201][ T8436] ? rtnl_create_link+0x7f5/0x810 [ 1237.214338][ T8436] ? wg_setup+0x1d0/0x1d0 [ 1237.218675][ T8436] rtnl_newlink+0xee5/0x1670 [ 1237.223310][ T8436] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1237.229591][ T8436] ? _raw_spin_unlock+0x26/0x40 [ 1237.234465][ T8436] ? __mutex_lock+0x21c/0x8d0 [ 1237.239193][ T8436] ? rtnl_setlink+0x300/0x300 [ 1237.243923][ T8436] rtnetlink_rcv_msg+0x807/0x8c0 [ 1237.248868][ T8436] ? memcg_account_kmem+0x121/0x140 [ 1237.254082][ T8436] ? __rcu_read_unlock+0x4d/0x70 [ 1237.259046][ T8436] ? mod_objcg_state+0x357/0x580 [ 1237.264127][ T8436] ? slab_post_alloc_hook+0x82/0x2f0 [ 1237.269431][ T8436] ? kmem_cache_free+0x1d9/0x380 [ 1237.274471][ T8436] ? __kfree_skb+0x104/0x140 [ 1237.279068][ T8436] ? nlmon_xmit+0x4b/0x60 [ 1237.283417][ T8436] ? __kfree_skb+0x104/0x140 [ 1237.288007][ T8436] ? consume_skb+0x57/0x180 [ 1237.292505][ T8436] ? nlmon_xmit+0x4b/0x60 [ 1237.296917][ T8436] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1237.302337][ T8436] ? __dev_queue_xmit+0xaae/0x1d80 [ 1237.307450][ T8436] ? ref_tracker_free+0x3a1/0x400 [ 1237.312558][ T8436] netlink_rcv_skb+0x126/0x220 [ 1237.317394][ T8436] ? rtnetlink_bind+0x60/0x60 [ 1237.322092][ T8436] rtnetlink_rcv+0x1c/0x20 [ 1237.326532][ T8436] netlink_unicast+0x589/0x650 [ 1237.331344][ T8436] netlink_sendmsg+0x66e/0x770 [ 1237.336111][ T8436] ? netlink_getsockopt+0x3e0/0x3e0 [ 1237.341315][ T8436] ____sys_sendmsg+0x37c/0x4d0 [ 1237.346080][ T8436] __sys_sendmsg+0x1e9/0x270 [ 1237.350717][ T8436] __x64_sys_sendmsg+0x46/0x50 [ 1237.355487][ T8436] do_syscall_64+0x44/0x110 [ 1237.360004][ T8436] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1237.365908][ T8436] RIP: 0033:0x7efd2e8d0ce9 [ 1237.370318][ T8436] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1237.390006][ T8436] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1237.398458][ T8436] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1237.406430][ T8436] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1237.414423][ T8436] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1237.422395][ T8436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1237.430372][ T8436] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1237.438390][ T8436] 03:19:22 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef003a00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1237.597687][ T8442] __nla_validate_parse: 18 callbacks suppressed [ 1237.597702][ T8442] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1237.628606][ T8442] wireguard12: entered promiscuous mode [ 1237.634203][ T8442] wireguard12: entered allmulticast mode 03:19:23 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7362ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:23 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef060200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:23 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x215, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:23 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef033a00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:23 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 23) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:23 executing program 4: shmctl$IPC_RMID(0x0, 0x0) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/4096) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 1238.402705][ T8451] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1238.460353][ T8451] wireguard12: entered promiscuous mode [ 1238.466242][ T8451] wireguard12: entered allmulticast mode [ 1238.504345][ T8452] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1238.566314][ T8452] wireguard15: entered promiscuous mode [ 1238.571921][ T8452] wireguard15: entered allmulticast mode [ 1238.623829][ T8460] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1238.633136][ T8460] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1238.642512][ T8460] FAULT_INJECTION: forcing a failure. [ 1238.642512][ T8460] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.655151][ T8460] CPU: 0 PID: 8460 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1238.665547][ T8460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1238.675640][ T8460] Call Trace: [ 1238.678925][ T8460] [ 1238.681854][ T8460] dump_stack_lvl+0xda/0x130 [ 1238.686482][ T8460] dump_stack+0x15/0x20 [ 1238.690648][ T8460] should_fail_ex+0x21f/0x230 [ 1238.695350][ T8460] ? alloc_workqueue+0x102/0xc30 [ 1238.700370][ T8460] __should_failslab+0x92/0xa0 [ 1238.705179][ T8460] should_failslab+0x9/0x20 [ 1238.709747][ T8460] __kmem_cache_alloc_node+0x4e/0x210 [ 1238.715202][ T8460] ? alloc_workqueue+0x102/0xc30 [ 1238.720148][ T8460] kmalloc_trace+0x2a/0xa0 [ 1238.724570][ T8460] alloc_workqueue+0x102/0xc30 [ 1238.729365][ T8460] wg_newlink+0x2da/0x580 [ 1238.733747][ T8460] ? rtnl_create_link+0x7f5/0x810 [ 1238.738786][ T8460] ? wg_setup+0x1d0/0x1d0 [ 1238.743168][ T8460] rtnl_newlink+0xee5/0x1670 [ 1238.747780][ T8460] ? prep_new_page+0x5a/0x1a0 [ 1238.752656][ T8460] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1238.759000][ T8460] ? _raw_spin_unlock+0x26/0x40 [ 1238.763856][ T8460] ? __mutex_lock+0x21c/0x8d0 [ 1238.768545][ T8460] ? rtnl_setlink+0x300/0x300 [ 1238.773237][ T8460] rtnetlink_rcv_msg+0x807/0x8c0 [ 1238.778238][ T8460] ? memcg_list_lru_alloc+0xd5/0x750 [ 1238.783561][ T8460] ? mod_objcg_state+0x357/0x580 [ 1238.788515][ T8460] ? slab_post_alloc_hook+0x82/0x2f0 [ 1238.793896][ T8460] ? kmem_cache_free+0x1d9/0x380 [ 1238.798873][ T8460] ? __kfree_skb+0x104/0x140 [ 1238.803467][ T8460] ? nlmon_xmit+0x4b/0x60 [ 1238.807804][ T8460] ? __kfree_skb+0x104/0x140 [ 1238.812415][ T8460] ? consume_skb+0x57/0x180 [ 1238.816919][ T8460] ? nlmon_xmit+0x4b/0x60 [ 1238.821261][ T8460] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1238.826675][ T8460] ? __dev_queue_xmit+0xaae/0x1d80 [ 1238.831791][ T8460] ? ref_tracker_free+0x3a1/0x400 [ 1238.836820][ T8460] netlink_rcv_skb+0x126/0x220 [ 1238.841592][ T8460] ? rtnetlink_bind+0x60/0x60 [ 1238.846388][ T8460] rtnetlink_rcv+0x1c/0x20 [ 1238.850810][ T8460] netlink_unicast+0x589/0x650 [ 1238.855608][ T8460] netlink_sendmsg+0x66e/0x770 [ 1238.860432][ T8460] ? netlink_getsockopt+0x3e0/0x3e0 [ 1238.865697][ T8460] ____sys_sendmsg+0x37c/0x4d0 [ 1238.870473][ T8460] __sys_sendmsg+0x1e9/0x270 [ 1238.875075][ T8460] __x64_sys_sendmsg+0x46/0x50 [ 1238.879919][ T8460] do_syscall_64+0x44/0x110 [ 1238.884581][ T8460] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1238.890563][ T8460] RIP: 0033:0x7efd2e8d0ce9 [ 1238.894980][ T8460] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1238.914586][ T8460] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1238.923072][ T8460] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1238.931074][ T8460] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1238.939045][ T8460] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1238.947055][ T8460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1238.955031][ T8460] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1238.963010][ T8460] 03:19:24 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef150200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:24 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef003f00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1239.121564][ T8469] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1239.144884][ T8469] wireguard15: entered promiscuous mode [ 1239.150469][ T8469] wireguard15: entered allmulticast mode 03:19:24 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 24) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:24 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef220200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1239.292242][ T8476] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1239.301617][ T8476] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1239.311046][ T8476] FAULT_INJECTION: forcing a failure. [ 1239.311046][ T8476] name failslab, interval 1, probability 0, space 0, times 0 [ 1239.323654][ T8476] CPU: 0 PID: 8476 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1239.333988][ T8476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1239.344059][ T8476] Call Trace: [ 1239.347391][ T8476] [ 1239.350322][ T8476] dump_stack_lvl+0xda/0x130 [ 1239.354984][ T8476] dump_stack+0x15/0x20 [ 1239.359202][ T8476] should_fail_ex+0x21f/0x230 [ 1239.363885][ T8476] ? alloc_workqueue+0x4cc/0xc30 [ 1239.368940][ T8476] __should_failslab+0x92/0xa0 [ 1239.373737][ T8476] should_failslab+0x9/0x20 [ 1239.378250][ T8476] kmem_cache_alloc_node+0x52/0x280 [ 1239.383476][ T8476] alloc_workqueue+0x4cc/0xc30 [ 1239.388333][ T8476] wg_newlink+0x2da/0x580 [ 1239.392697][ T8476] ? rtnl_create_link+0x7f5/0x810 [ 1239.397732][ T8476] ? wg_setup+0x1d0/0x1d0 [ 1239.402103][ T8476] rtnl_newlink+0xee5/0x1670 [ 1239.406712][ T8476] ? __mutex_lock+0x54/0x8d0 [ 1239.411387][ T8476] ? rtnl_setlink+0x300/0x300 [ 1239.416144][ T8476] rtnetlink_rcv_msg+0x807/0x8c0 [ 1239.421085][ T8476] ? memcg_account_kmem+0x121/0x140 [ 1239.426295][ T8476] ? __rcu_read_unlock+0x4d/0x70 [ 1239.431288][ T8476] ? mod_objcg_state+0x357/0x580 [ 1239.436240][ T8476] ? slab_post_alloc_hook+0x82/0x2f0 [ 1239.441553][ T8476] ? kmem_cache_free+0x1d9/0x380 [ 1239.446499][ T8476] ? __kfree_skb+0x104/0x140 [ 1239.451097][ T8476] ? nlmon_xmit+0x4b/0x60 [ 1239.455431][ T8476] ? __kfree_skb+0x104/0x140 [ 1239.460022][ T8476] ? consume_skb+0x57/0x180 [ 1239.464571][ T8476] ? nlmon_xmit+0x4b/0x60 [ 1239.468918][ T8476] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1239.474327][ T8476] ? __dev_queue_xmit+0xaae/0x1d80 [ 1239.479513][ T8476] ? ref_tracker_free+0x3a1/0x400 [ 1239.484580][ T8476] netlink_rcv_skb+0x126/0x220 [ 1239.489348][ T8476] ? rtnetlink_bind+0x60/0x60 [ 1239.494028][ T8476] rtnetlink_rcv+0x1c/0x20 [ 1239.498518][ T8476] netlink_unicast+0x589/0x650 [ 1239.503446][ T8476] netlink_sendmsg+0x66e/0x770 [ 1239.508214][ T8476] ? netlink_getsockopt+0x3e0/0x3e0 [ 1239.513416][ T8476] ____sys_sendmsg+0x37c/0x4d0 [ 1239.518197][ T8476] __sys_sendmsg+0x1e9/0x270 [ 1239.522863][ T8476] __x64_sys_sendmsg+0x46/0x50 [ 1239.527632][ T8476] do_syscall_64+0x44/0x110 [ 1239.532376][ T8476] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1239.538454][ T8476] RIP: 0033:0x7efd2e8d0ce9 [ 1239.542908][ T8476] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1239.562537][ T8476] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1239.571125][ T8476] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1239.579192][ T8476] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1239.587252][ T8476] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1239.595222][ T8476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1239.603268][ T8476] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1239.611371][ T8476] [ 1239.631528][ T8471] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1239.680324][ T8471] wireguard12: entered promiscuous mode [ 1239.685922][ T8471] wireguard12: entered allmulticast mode [ 1239.752801][ T8479] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1239.797062][ T8479] wireguard15: entered promiscuous mode [ 1239.802817][ T8479] wireguard15: entered allmulticast mode 03:19:24 executing program 4: shmctl$IPC_RMID(0x0, 0x0) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/4096) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) shmctl$IPC_RMID(0x0, 0x0) (async) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) (async) shmctl$SHM_UNLOCK(r0, 0xc) (async) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/4096) (async) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) (async) 03:19:25 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef004000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1239.979908][ T8486] wireguard12: entered promiscuous mode [ 1239.985540][ T8486] wireguard12: entered allmulticast mode 03:19:25 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7390ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:25 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef2e0200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 25) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:25 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef004400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:25 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x2cd, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:25 executing program 4: shmctl$IPC_RMID(0x0, 0x0) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/4096) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) shmctl$IPC_RMID(0x0, 0x0) (async) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) (async) shmctl$SHM_UNLOCK(r0, 0xc) (async) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/4096) (async) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) (async) [ 1240.798352][ T8500] wireguard15: entered promiscuous mode [ 1240.804047][ T8500] wireguard15: entered allmulticast mode [ 1240.849339][ T8501] wireguard12: entered promiscuous mode [ 1240.854961][ T8501] wireguard12: entered allmulticast mode [ 1240.905051][ T8509] FAULT_INJECTION: forcing a failure. [ 1240.905051][ T8509] name failslab, interval 1, probability 0, space 0, times 0 [ 1240.917817][ T8509] CPU: 1 PID: 8509 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1240.928184][ T8509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1240.938244][ T8509] Call Trace: [ 1240.941526][ T8509] [ 1240.944457][ T8509] dump_stack_lvl+0xda/0x130 [ 1240.949070][ T8509] dump_stack+0x15/0x20 [ 1240.953244][ T8509] should_fail_ex+0x21f/0x230 [ 1240.957997][ T8509] ? alloc_workqueue+0x4cc/0xc30 [ 1240.963028][ T8509] __should_failslab+0x92/0xa0 [ 1240.967810][ T8509] should_failslab+0x9/0x20 [ 1240.972382][ T8509] kmem_cache_alloc_node+0x52/0x280 [ 1240.977707][ T8509] ? pwq_adjust_max_active+0x32f/0x350 [ 1240.983222][ T8509] alloc_workqueue+0x4cc/0xc30 [ 1240.988017][ T8509] wg_newlink+0x2da/0x580 [ 1240.992361][ T8509] ? rtnl_create_link+0x7f5/0x810 [ 1240.997449][ T8509] ? wg_setup+0x1d0/0x1d0 [ 1241.001786][ T8509] rtnl_newlink+0xee5/0x1670 [ 1241.006444][ T8509] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1241.012770][ T8509] ? _raw_spin_unlock+0x26/0x40 [ 1241.017626][ T8509] ? __mutex_lock+0x21c/0x8d0 [ 1241.022334][ T8509] ? rtnl_setlink+0x300/0x300 [ 1241.027059][ T8509] rtnetlink_rcv_msg+0x807/0x8c0 [ 1241.031999][ T8509] ? memcg_list_lru_alloc+0xd5/0x750 [ 1241.037319][ T8509] ? mod_objcg_state+0x357/0x580 [ 1241.042263][ T8509] ? slab_post_alloc_hook+0x82/0x2f0 [ 1241.047563][ T8509] ? kmem_cache_free+0x1d9/0x380 [ 1241.052506][ T8509] ? __kfree_skb+0x104/0x140 [ 1241.057197][ T8509] ? nlmon_xmit+0x4b/0x60 [ 1241.061536][ T8509] ? __kfree_skb+0x104/0x140 [ 1241.066134][ T8509] ? consume_skb+0x57/0x180 [ 1241.070679][ T8509] ? nlmon_xmit+0x4b/0x60 [ 1241.075021][ T8509] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1241.080519][ T8509] ? __dev_queue_xmit+0xaae/0x1d80 [ 1241.085645][ T8509] ? ref_tracker_free+0x3a1/0x400 [ 1241.090698][ T8509] netlink_rcv_skb+0x126/0x220 [ 1241.095473][ T8509] ? rtnetlink_bind+0x60/0x60 [ 1241.100161][ T8509] rtnetlink_rcv+0x1c/0x20 [ 1241.104582][ T8509] netlink_unicast+0x589/0x650 [ 1241.109401][ T8509] netlink_sendmsg+0x66e/0x770 [ 1241.114181][ T8509] ? netlink_getsockopt+0x3e0/0x3e0 [ 1241.119378][ T8509] ____sys_sendmsg+0x37c/0x4d0 [ 1241.124180][ T8509] __sys_sendmsg+0x1e9/0x270 [ 1241.128777][ T8509] __x64_sys_sendmsg+0x46/0x50 [ 1241.133551][ T8509] do_syscall_64+0x44/0x110 [ 1241.138183][ T8509] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1241.144115][ T8509] RIP: 0033:0x7efd2e8d0ce9 [ 1241.148571][ T8509] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1241.168287][ T8509] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1241.176707][ T8509] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1241.184735][ T8509] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1241.192718][ T8509] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1241.200691][ T8509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1241.208715][ T8509] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1241.216768][ T8509] 03:19:26 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef400200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:26 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef884700000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1241.358831][ T8518] wireguard15: entered promiscuous mode [ 1241.364561][ T8518] wireguard15: entered allmulticast mode [ 1241.444526][ T8519] wireguard12: entered promiscuous mode [ 1241.450109][ T8519] wireguard12: entered allmulticast mode 03:19:26 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef540200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:26 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefee4700000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:26 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 26) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1241.592751][ T8530] wireguard15: entered promiscuous mode [ 1241.598425][ T8530] wireguard15: entered allmulticast mode 03:19:26 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7399ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1241.723364][ T8533] wireguard12: entered promiscuous mode [ 1241.729018][ T8533] wireguard12: entered allmulticast mode 03:19:26 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x0, 0x100) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)="2a623f3d37232b8ae45917f72b90d77343c24d46f1f962361ecbd2269d07b3b26ff0ba87e023ef00188c12b7c5cadd36f4ad24bad1fe55ac1b6c9836e74e7c6b43019ac86e5aca32131ab0a30db4a1d606df26ccd3f72d3452ddeb1b572afb", 0x5f}}, 0x8000) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000000140)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000180)="e0ed461dfb9dd925c1f0ee9ebb9f3a81da09336b4af1f5d38d7f9c7fcf1df1e70209e3dd0f2a4607917b1065306890dbbbc81e1bb8087390be468b95d1adc243ffc5549adce598e6a804a2bb2384e05203c0d042a7df128d", 0x8d}, {&(0x7f0000000200)="3f4141f55d2469533c4f490ba2d7891a22dee6586bbfeeb1e0c3f23588c59a8033c81b21ecc3e9b7a40925164b4e0993e5827166c0874b512e4dc6f866ca413584779393c72a32ee76c856", 0x4b}, {&(0x7f0000000280)="1889eb2c5371059e83fb9846e4dbb58acd9c2166e001f0f59c649bd2041778e014e4af750e153efb47a1fa5786b228e680c323ad48355aaa9b5116e2804406d15b3c0e9fed0de8cf89d66e8749001ea559cfcd309742f2a346e1d9f8c3c27431919bb9aeadfea52eeaa26b52523e5e320b0f679263b4015d6ea74c7b5a6eb66270cb434ffeb5dc7b46ad117cd827070bd4136e33afc135a0ce317e", 0x9b}, {&(0x7f0000000340)="9738989566faf71408bfba45f6379654de750c0e92ef04501022052349274d328deed03159f5d17c245e39bd9b6f459dd516977e3ebd430b1d32ff44efa41cce3647bfcd2c09104ba7370a9ea337cb0aee58a7281a882ba9ccefd53f77f3b9e84d166767ca9122c06e1ffad7d0290e9c250eee168a29167b8ca92ec17594b35cca1164297c8145051678fbfb8efd12424e9b0c9ec8088d0641cfd3bbe4bca5cda32249b6e1ee7f6ed2615d4dc0079d08252ac05b549bb2a5d3b2adbfca1cab03d11dfa05eb3ac9ce29411fb124da92", 0xcf}, {&(0x7f0000000440)="fbc3aed45f500b59cfc0a84a781e12565f3f62447e7e0b2c585b5f059961217f909a675ac365dfe4e60357c7525a6ab52064d9587a7ca808e9e408e1330d16b434366f8cbbe702a741954e2aa2e145d349998d2f6fd46e0109082c2c055c5cd4f561ad695b01e4b43af586b98afda549a755c4ca5215b81118f7f6711995f4979f82102bce65e6841da3844c3c6dc512dc887a1e7fbe7de8f6054c82f3e455a262a7a90c867fe4d87236271a35b173af2811f57181823b7b5a0f8467c93c21649298f297a331c9002f9f05b4145d90", 0xcf}, {&(0x7f0000000540)}], 0x6, &(0x7f0000000600)=[@ip_tos_u8={{0x18, 0x0, 0x1, 0x46}}], 0x18}, 0x40801) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 1241.822696][ T8540] FAULT_INJECTION: forcing a failure. [ 1241.822696][ T8540] name failslab, interval 1, probability 0, space 0, times 0 [ 1241.835476][ T8540] CPU: 1 PID: 8540 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1241.845814][ T8540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1241.855917][ T8540] Call Trace: [ 1241.859215][ T8540] [ 1241.862148][ T8540] dump_stack_lvl+0xda/0x130 [ 1241.866749][ T8540] dump_stack+0x15/0x20 [ 1241.870994][ T8540] should_fail_ex+0x21f/0x230 [ 1241.875719][ T8540] ? init_rescuer+0x69/0x1c0 [ 1241.880348][ T8540] __should_failslab+0x92/0xa0 [ 1241.885187][ T8540] should_failslab+0x9/0x20 [ 1241.889728][ T8540] __kmem_cache_alloc_node+0x4e/0x210 [ 1241.895111][ T8540] ? init_rescuer+0x69/0x1c0 [ 1241.899828][ T8540] kmalloc_node_trace+0x27/0xa0 [ 1241.904697][ T8540] init_rescuer+0x69/0x1c0 [ 1241.909147][ T8540] alloc_workqueue+0x996/0xc30 [ 1241.913952][ T8540] wg_newlink+0x2da/0x580 [ 1241.918368][ T8540] ? rtnl_create_link+0x7f5/0x810 [ 1241.923411][ T8540] ? wg_setup+0x1d0/0x1d0 [ 1241.927753][ T8540] rtnl_newlink+0xee5/0x1670 [ 1241.932384][ T8540] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1241.938701][ T8540] ? _raw_spin_unlock+0x26/0x40 [ 1241.943548][ T8540] ? __mutex_lock+0x21c/0x8d0 [ 1241.948309][ T8540] ? rtnl_setlink+0x300/0x300 [ 1241.953000][ T8540] rtnetlink_rcv_msg+0x807/0x8c0 [ 1241.957949][ T8540] ? memcg_list_lru_alloc+0xd5/0x750 [ 1241.963337][ T8540] ? security_inode_alloc+0x32/0xd0 [ 1241.968540][ T8540] ? slab_post_alloc_hook+0x82/0x2f0 [ 1241.973845][ T8540] ? kmem_cache_free+0x1d9/0x380 [ 1241.978790][ T8540] ? __kfree_skb+0x104/0x140 [ 1241.983379][ T8540] ? nlmon_xmit+0x4b/0x60 [ 1241.987714][ T8540] ? __kfree_skb+0x104/0x140 [ 1241.992301][ T8540] ? consume_skb+0x57/0x180 [ 1241.996944][ T8540] ? nlmon_xmit+0x4b/0x60 [ 1242.001278][ T8540] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1242.006587][ T8540] ? __dev_queue_xmit+0xaae/0x1d80 [ 1242.011700][ T8540] ? ref_tracker_free+0x3a1/0x400 [ 1242.016798][ T8540] netlink_rcv_skb+0x126/0x220 [ 1242.021649][ T8540] ? rtnetlink_bind+0x60/0x60 [ 1242.026332][ T8540] rtnetlink_rcv+0x1c/0x20 [ 1242.030805][ T8540] netlink_unicast+0x589/0x650 [ 1242.035648][ T8540] netlink_sendmsg+0x66e/0x770 [ 1242.040433][ T8540] ? netlink_getsockopt+0x3e0/0x3e0 [ 1242.045670][ T8540] ____sys_sendmsg+0x37c/0x4d0 [ 1242.050507][ T8540] __sys_sendmsg+0x1e9/0x270 [ 1242.055155][ T8540] __x64_sys_sendmsg+0x46/0x50 [ 1242.059930][ T8540] do_syscall_64+0x44/0x110 [ 1242.064459][ T8540] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1242.070419][ T8540] RIP: 0033:0x7efd2e8d0ce9 [ 1242.074837][ T8540] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1242.094460][ T8540] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1242.102939][ T8540] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1242.110914][ T8540] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1242.118947][ T8540] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1242.126952][ T8540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1242.135021][ T8540] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1242.143138][ T8540] [ 1242.146537][ T8540] workqueue: Failed to allocate a rescuer for wq "wg-crypt-wireguard%d" 03:19:27 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd73530880b904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:27 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef004800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:27 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef8c0200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:27 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x2ef, 0x0, 0x0, 0x0) mlockall(0x0) [ 1242.294436][ T8550] wireguard12: entered promiscuous mode [ 1242.300056][ T8550] wireguard12: entered allmulticast mode [ 1242.332100][ T8553] wireguard15: entered promiscuous mode [ 1242.337857][ T8553] wireguard15: entered allmulticast mode 03:19:27 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 27) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:27 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef034800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:27 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef9d0200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1242.521496][ T8564] wireguard12: entered promiscuous mode [ 1242.527205][ T8564] wireguard12: entered allmulticast mode [ 1242.570506][ T8567] FAULT_INJECTION: forcing a failure. [ 1242.570506][ T8567] name failslab, interval 1, probability 0, space 0, times 0 [ 1242.583270][ T8567] CPU: 1 PID: 8567 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1242.593647][ T8567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1242.603703][ T8567] Call Trace: [ 1242.607033][ T8567] [ 1242.609962][ T8567] dump_stack_lvl+0xda/0x130 [ 1242.614566][ T8567] dump_stack+0x15/0x20 [ 1242.618780][ T8567] should_fail_ex+0x21f/0x230 [ 1242.623533][ T8567] ? __kthread_create_on_node+0x78/0x230 [ 1242.629188][ T8567] __should_failslab+0x92/0xa0 [ 1242.634082][ T8567] should_failslab+0x9/0x20 [ 1242.638667][ T8567] __kmem_cache_alloc_node+0x4e/0x210 [ 1242.644151][ T8567] ? pcpu_alloc_area+0x4ab/0x4d0 [ 1242.649141][ T8567] ? install_unbound_pwq+0x160/0x160 [ 1242.654434][ T8567] ? __kthread_create_on_node+0x78/0x230 [ 1242.660082][ T8567] kmalloc_trace+0x2a/0xa0 [ 1242.664548][ T8567] __kthread_create_on_node+0x78/0x230 [ 1242.670021][ T8567] ? install_unbound_pwq+0x160/0x160 [ 1242.675318][ T8567] kthread_create_on_node+0x8a/0xb0 [ 1242.680572][ T8567] ? __kmem_cache_alloc_node+0x17f/0x210 [ 1242.686324][ T8567] ? kmalloc_node_trace+0x27/0xa0 [ 1242.691394][ T8567] init_rescuer+0x10f/0x1c0 [ 1242.695909][ T8567] alloc_workqueue+0x996/0xc30 [ 1242.700689][ T8567] wg_newlink+0x2da/0x580 [ 1242.705029][ T8567] ? rtnl_create_link+0x7f5/0x810 [ 1242.710074][ T8567] ? wg_setup+0x1d0/0x1d0 [ 1242.714418][ T8567] rtnl_newlink+0xee5/0x1670 [ 1242.719089][ T8567] ? __mutex_lock+0x54/0x8d0 [ 1242.723750][ T8567] ? rtnl_setlink+0x300/0x300 [ 1242.728454][ T8567] rtnetlink_rcv_msg+0x807/0x8c0 [ 1242.733403][ T8567] ? security_inode_alloc+0x32/0xd0 [ 1242.738655][ T8567] ? slab_post_alloc_hook+0x82/0x2f0 [ 1242.744174][ T8567] ? kmem_cache_free+0x1d9/0x380 [ 1242.749126][ T8567] ? __kfree_skb+0x104/0x140 [ 1242.753789][ T8567] ? nlmon_xmit+0x4b/0x60 [ 1242.758138][ T8567] ? __kfree_skb+0x104/0x140 [ 1242.762813][ T8567] ? consume_skb+0x57/0x180 [ 1242.767321][ T8567] ? nlmon_xmit+0x4b/0x60 [ 1242.771738][ T8567] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1242.777073][ T8567] ? __dev_queue_xmit+0xaae/0x1d80 [ 1242.782248][ T8567] ? ref_tracker_free+0x3a1/0x400 [ 1242.787285][ T8567] netlink_rcv_skb+0x126/0x220 [ 1242.792057][ T8567] ? rtnetlink_bind+0x60/0x60 [ 1242.796790][ T8567] rtnetlink_rcv+0x1c/0x20 [ 1242.801216][ T8567] netlink_unicast+0x589/0x650 [ 1242.806004][ T8567] netlink_sendmsg+0x66e/0x770 [ 1242.810790][ T8567] ? netlink_getsockopt+0x3e0/0x3e0 [ 1242.815990][ T8567] ____sys_sendmsg+0x37c/0x4d0 [ 1242.820779][ T8567] __sys_sendmsg+0x1e9/0x270 [ 1242.825388][ T8567] __x64_sys_sendmsg+0x46/0x50 [ 1242.830159][ T8567] do_syscall_64+0x44/0x110 [ 1242.834703][ T8567] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1242.840645][ T8567] RIP: 0033:0x7efd2e8d0ce9 [ 1242.845061][ T8567] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 03:19:28 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd73530881c904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1242.864701][ T8567] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1242.873166][ T8567] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1242.881139][ T8567] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1242.889112][ T8567] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1242.897232][ T8567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1242.905223][ T8567] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1242.913205][ T8567] [ 1242.917391][ T8567] workqueue: Failed to create a rescuer kthread for wq "wg-crypt-wireguard%d": -ENOMEM [ 1242.959961][ T8569] __nla_validate_parse: 16 callbacks suppressed [ 1242.959974][ T8569] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1243.091632][ T8569] wireguard15: entered promiscuous mode [ 1243.097256][ T8569] wireguard15: entered allmulticast mode 03:19:28 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef884800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 28) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1243.377851][ T8579] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:19:28 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefa00200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1243.420317][ T8579] wireguard12: entered promiscuous mode [ 1243.426516][ T8579] wireguard12: entered allmulticast mode [ 1243.497809][ T8585] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1243.507052][ T8585] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1243.516475][ T8585] FAULT_INJECTION: forcing a failure. [ 1243.516475][ T8585] name failslab, interval 1, probability 0, space 0, times 0 [ 1243.529082][ T8585] CPU: 0 PID: 8585 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1243.539477][ T8585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1243.549529][ T8585] Call Trace: [ 1243.552837][ T8585] [ 1243.555775][ T8585] dump_stack_lvl+0xda/0x130 [ 1243.560377][ T8585] dump_stack+0x15/0x20 [ 1243.564542][ T8585] should_fail_ex+0x21f/0x230 [ 1243.569266][ T8585] ? __kthread_create_on_node+0xce/0x230 [ 1243.574915][ T8585] __should_failslab+0x92/0xa0 [ 1243.580566][ T8585] should_failslab+0x9/0x20 [ 1243.585085][ T8585] __kmem_cache_alloc_node+0x4e/0x210 [ 1243.590491][ T8585] ? __kthread_create_on_node+0xce/0x230 [ 1243.596177][ T8585] __kmalloc_node_track_caller+0x96/0x1a0 [ 1243.601916][ T8585] kvasprintf+0x8c/0x110 [ 1243.606158][ T8585] ? install_unbound_pwq+0x160/0x160 [ 1243.611509][ T8585] ? __kthread_create_on_node+0x78/0x230 [ 1243.617148][ T8585] ? install_unbound_pwq+0x160/0x160 [ 1243.622519][ T8585] __kthread_create_on_node+0xce/0x230 [ 1243.628050][ T8585] ? install_unbound_pwq+0x160/0x160 [ 1243.633440][ T8585] kthread_create_on_node+0x8a/0xb0 [ 1243.638650][ T8585] ? __kmem_cache_alloc_node+0x17f/0x210 [ 1243.644320][ T8585] ? kmalloc_node_trace+0x27/0xa0 [ 1243.649449][ T8585] init_rescuer+0x10f/0x1c0 [ 1243.653970][ T8585] alloc_workqueue+0x996/0xc30 [ 1243.658743][ T8585] wg_newlink+0x2da/0x580 [ 1243.663089][ T8585] ? rtnl_create_link+0x7f5/0x810 [ 1243.668125][ T8585] ? wg_setup+0x1d0/0x1d0 [ 1243.672464][ T8585] rtnl_newlink+0xee5/0x1670 [ 1243.677097][ T8585] ? mutex_spin_on_owner+0xc6/0x170 [ 1243.682413][ T8585] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1243.688670][ T8585] ? _raw_spin_unlock+0x26/0x40 [ 1243.693527][ T8585] ? __mutex_lock+0x21c/0x8d0 [ 1243.698288][ T8585] ? rtnl_setlink+0x300/0x300 [ 1243.702988][ T8585] rtnetlink_rcv_msg+0x807/0x8c0 [ 1243.707937][ T8585] ? memcg_list_lru_alloc+0xd5/0x750 [ 1243.713286][ T8585] ? mod_objcg_state+0x357/0x580 [ 1243.718228][ T8585] ? slab_post_alloc_hook+0x82/0x2f0 [ 1243.723540][ T8585] ? kmem_cache_free+0x1d9/0x380 [ 1243.728477][ T8585] ? __kfree_skb+0x104/0x140 [ 1243.733106][ T8585] ? nlmon_xmit+0x4b/0x60 [ 1243.737450][ T8585] ? __kfree_skb+0x104/0x140 [ 1243.742065][ T8585] ? consume_skb+0x57/0x180 [ 1243.746575][ T8585] ? nlmon_xmit+0x4b/0x60 [ 1243.750953][ T8585] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1243.756249][ T8585] ? __dev_queue_xmit+0xaae/0x1d80 [ 1243.761370][ T8585] ? ref_tracker_free+0x3a1/0x400 [ 1243.766428][ T8585] netlink_rcv_skb+0x126/0x220 [ 1243.771201][ T8585] ? rtnetlink_bind+0x60/0x60 [ 1243.775888][ T8585] rtnetlink_rcv+0x1c/0x20 [ 1243.780313][ T8585] netlink_unicast+0x589/0x650 [ 1243.785106][ T8585] netlink_sendmsg+0x66e/0x770 [ 1243.789870][ T8585] ? netlink_getsockopt+0x3e0/0x3e0 [ 1243.795119][ T8585] ____sys_sendmsg+0x37c/0x4d0 [ 1243.799885][ T8585] __sys_sendmsg+0x1e9/0x270 [ 1243.804493][ T8585] __x64_sys_sendmsg+0x46/0x50 [ 1243.809316][ T8585] do_syscall_64+0x44/0x110 [ 1243.813921][ T8585] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1243.819897][ T8585] RIP: 0033:0x7efd2e8d0ce9 [ 1243.824338][ T8585] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1243.843953][ T8585] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1243.852406][ T8585] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1243.860384][ T8585] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1243.868377][ T8585] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1243.876358][ T8585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1243.884376][ T8585] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1243.892425][ T8585] [ 1243.895623][ T8585] workqueue: Failed to create a rescuer kthread for wq "wg-crypt-wireguard%d": -ENOMEM [ 1243.895711][ T8589] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1243.983783][ T8589] wireguard15: entered promiscuous mode [ 1243.989544][ T8589] wireguard15: entered allmulticast mode 03:19:29 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef004c00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:29 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefc40200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:29 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x0, 0x100) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)="2a623f3d37232b8ae45917f72b90d77343c24d46f1f962361ecbd2269d07b3b26ff0ba87e023ef00188c12b7c5cadd36f4ad24bad1fe55ac1b6c9836e74e7c6b43019ac86e5aca32131ab0a30db4a1d606df26ccd3f72d3452ddeb1b572afb", 0x5f}}, 0x8000) (async) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000000140)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000180)="e0ed461dfb9dd925c1f0ee9ebb9f3a81da09336b4af1f5d38d7f9c7fcf1df1e70209e3dd0f2a4607917b1065306890dbbbc81e1bb8087390be468b95d1adc243ffc5549adce598e6a804a2bb2384e05203c0d042a7df128d", 0x8d}, {&(0x7f0000000200)="3f4141f55d2469533c4f490ba2d7891a22dee6586bbfeeb1e0c3f23588c59a8033c81b21ecc3e9b7a40925164b4e0993e5827166c0874b512e4dc6f866ca413584779393c72a32ee76c856", 0x4b}, {&(0x7f0000000280)="1889eb2c5371059e83fb9846e4dbb58acd9c2166e001f0f59c649bd2041778e014e4af750e153efb47a1fa5786b228e680c323ad48355aaa9b5116e2804406d15b3c0e9fed0de8cf89d66e8749001ea559cfcd309742f2a346e1d9f8c3c27431919bb9aeadfea52eeaa26b52523e5e320b0f679263b4015d6ea74c7b5a6eb66270cb434ffeb5dc7b46ad117cd827070bd4136e33afc135a0ce317e", 0x9b}, {&(0x7f0000000340)="9738989566faf71408bfba45f6379654de750c0e92ef04501022052349274d328deed03159f5d17c245e39bd9b6f459dd516977e3ebd430b1d32ff44efa41cce3647bfcd2c09104ba7370a9ea337cb0aee58a7281a882ba9ccefd53f77f3b9e84d166767ca9122c06e1ffad7d0290e9c250eee168a29167b8ca92ec17594b35cca1164297c8145051678fbfb8efd12424e9b0c9ec8088d0641cfd3bbe4bca5cda32249b6e1ee7f6ed2615d4dc0079d08252ac05b549bb2a5d3b2adbfca1cab03d11dfa05eb3ac9ce29411fb124da92", 0xcf}, {&(0x7f0000000440)="fbc3aed45f500b59cfc0a84a781e12565f3f62447e7e0b2c585b5f059961217f909a675ac365dfe4e60357c7525a6ab52064d9587a7ca808e9e408e1330d16b434366f8cbbe702a741954e2aa2e145d349998d2f6fd46e0109082c2c055c5cd4f561ad695b01e4b43af586b98afda549a755c4ca5215b81118f7f6711995f4979f82102bce65e6841da3844c3c6dc512dc887a1e7fbe7de8f6054c82f3e455a262a7a90c867fe4d87236271a35b173af2811f57181823b7b5a0f8467c93c21649298f297a331c9002f9f05b4145d90", 0xcf}, {&(0x7f0000000540)}], 0x6, &(0x7f0000000600)=[@ip_tos_u8={{0x18, 0x0, 0x1, 0x46}}], 0x18}, 0x40801) (async) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:19:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 29) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1244.191414][ T8596] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1244.243752][ T8596] wireguard12: entered promiscuous mode [ 1244.249409][ T8596] wireguard12: entered allmulticast mode 03:19:29 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x900, 0x0, 0x0, 0x0) mlockall(0x0) [ 1244.307775][ T8595] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1244.367817][ T8595] wireguard15: entered promiscuous mode [ 1244.373390][ T8595] wireguard15: entered allmulticast mode [ 1244.420029][ T8602] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1244.429459][ T8602] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1244.441688][ T8602] wireguard15: entered promiscuous mode [ 1244.447311][ T8602] wireguard15: entered allmulticast mode 03:19:29 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef025000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:29 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefc60200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1244.528025][ T8613] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1244.578828][ T8613] wireguard12: entered promiscuous mode [ 1244.584577][ T8613] wireguard12: entered allmulticast mode [ 1244.658546][ T8616] wireguard15: entered promiscuous mode [ 1244.664214][ T8616] wireguard15: entered allmulticast mode 03:19:29 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef005600000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1244.874986][ T8620] wireguard12: entered promiscuous mode [ 1244.880622][ T8620] wireguard12: entered allmulticast mode 03:19:30 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308828904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:30 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefe40200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:30 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef655800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:30 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 30) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:30 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x1100, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:30 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x0, 0x100) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)="2a623f3d37232b8ae45917f72b90d77343c24d46f1f962361ecbd2269d07b3b26ff0ba87e023ef00188c12b7c5cadd36f4ad24bad1fe55ac1b6c9836e74e7c6b43019ac86e5aca32131ab0a30db4a1d606df26ccd3f72d3452ddeb1b572afb", 0x5f}}, 0x8000) (async) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000000140)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000180)="e0ed461dfb9dd925c1f0ee9ebb9f3a81da09336b4af1f5d38d7f9c7fcf1df1e70209e3dd0f2a4607917b1065306890dbbbc81e1bb8087390be468b95d1adc243ffc5549adce598e6a804a2bb2384e05203c0d042a7df128d", 0x8d}, {&(0x7f0000000200)="3f4141f55d2469533c4f490ba2d7891a22dee6586bbfeeb1e0c3f23588c59a8033c81b21ecc3e9b7a40925164b4e0993e5827166c0874b512e4dc6f866ca413584779393c72a32ee76c856", 0x4b}, {&(0x7f0000000280)="1889eb2c5371059e83fb9846e4dbb58acd9c2166e001f0f59c649bd2041778e014e4af750e153efb47a1fa5786b228e680c323ad48355aaa9b5116e2804406d15b3c0e9fed0de8cf89d66e8749001ea559cfcd309742f2a346e1d9f8c3c27431919bb9aeadfea52eeaa26b52523e5e320b0f679263b4015d6ea74c7b5a6eb66270cb434ffeb5dc7b46ad117cd827070bd4136e33afc135a0ce317e", 0x9b}, {&(0x7f0000000340)="9738989566faf71408bfba45f6379654de750c0e92ef04501022052349274d328deed03159f5d17c245e39bd9b6f459dd516977e3ebd430b1d32ff44efa41cce3647bfcd2c09104ba7370a9ea337cb0aee58a7281a882ba9ccefd53f77f3b9e84d166767ca9122c06e1ffad7d0290e9c250eee168a29167b8ca92ec17594b35cca1164297c8145051678fbfb8efd12424e9b0c9ec8088d0641cfd3bbe4bca5cda32249b6e1ee7f6ed2615d4dc0079d08252ac05b549bb2a5d3b2adbfca1cab03d11dfa05eb3ac9ce29411fb124da92", 0xcf}, {&(0x7f0000000440)="fbc3aed45f500b59cfc0a84a781e12565f3f62447e7e0b2c585b5f059961217f909a675ac365dfe4e60357c7525a6ab52064d9587a7ca808e9e408e1330d16b434366f8cbbe702a741954e2aa2e145d349998d2f6fd46e0109082c2c055c5cd4f561ad695b01e4b43af586b98afda549a755c4ca5215b81118f7f6711995f4979f82102bce65e6841da3844c3c6dc512dc887a1e7fbe7de8f6054c82f3e455a262a7a90c867fe4d87236271a35b173af2811f57181823b7b5a0f8467c93c21649298f297a331c9002f9f05b4145d90", 0xcf}, {&(0x7f0000000540)}], 0x6, &(0x7f0000000600)=[@ip_tos_u8={{0x18, 0x0, 0x1, 0x46}}], 0x18}, 0x40801) (async) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 1245.373434][ T8632] wireguard12: entered promiscuous mode [ 1245.379148][ T8632] wireguard12: entered allmulticast mode [ 1245.447546][ T8630] wireguard15: entered promiscuous mode [ 1245.453136][ T8630] wireguard15: entered allmulticast mode [ 1245.547407][ T8634] wireguard16: entered promiscuous mode [ 1245.552989][ T8634] wireguard16: entered allmulticast mode 03:19:30 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef035c00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:30 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefe80200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1245.733789][ T8647] wireguard12: entered promiscuous mode [ 1245.739441][ T8647] wireguard12: entered allmulticast mode [ 1245.839366][ T8649] wireguard15: entered promiscuous mode [ 1245.844977][ T8649] wireguard15: entered allmulticast mode 03:19:31 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefea0200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:31 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef006000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:31 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815900220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 31) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1246.120720][ T8654] wireguard15: entered promiscuous mode [ 1246.126695][ T8654] wireguard15: entered allmulticast mode [ 1246.215902][ T8656] wireguard12: entered promiscuous mode [ 1246.221526][ T8656] wireguard12: entered allmulticast mode [ 1246.327355][ T8666] wireguard17: entered promiscuous mode [ 1246.333034][ T8666] wireguard17: entered allmulticast mode 03:19:31 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:31 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef016200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:31 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904205ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1246.444187][ T8670] wireguard15: entered promiscuous mode [ 1246.449770][ T8670] wireguard15: entered allmulticast mode [ 1246.521208][ T8674] wireguard12: entered promiscuous mode [ 1246.526933][ T8674] wireguard12: entered allmulticast mode 03:19:31 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef280300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1246.680807][ T8680] wireguard15: entered promiscuous mode [ 1246.686442][ T8680] wireguard15: entered allmulticast mode 03:19:32 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef300300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:32 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904206ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:32 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef586500000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 32) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:32 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x1201, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:32 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'pim6reg1\x00'}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x11}, 0x8c0) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) mlockall(0x2) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000002c0), r3) sendmsg$NLBL_MGMT_C_ADDDEF(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r4, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev}]}, 0x44}}, 0x0) sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x48, r4, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @empty}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x48}, 0x1, 0x0, 0x0, 0x48000}, 0x1) shmctl$SHM_UNLOCK(r1, 0xc) r5 = shmget(0x2, 0x2000, 0x40, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r5, 0xb) shmat(r1, &(0x7f0000ffa000/0x3000)=nil, 0x5000) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) shmat(0xffffffffffffffff, &(0x7f0000ff8000/0x4000)=nil, 0x4000) [ 1247.214709][ T8689] wireguard15: entered promiscuous mode [ 1247.220299][ T8689] wireguard15: entered allmulticast mode [ 1247.276457][ T8694] wireguard12: entered promiscuous mode [ 1247.282045][ T8694] wireguard12: entered allmulticast mode [ 1247.340625][ T8698] wireguard18: entered promiscuous mode [ 1247.346252][ T8698] wireguard18: entered allmulticast mode 03:19:32 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef380300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:32 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef036600000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1247.461128][ T8710] wireguard15: entered promiscuous mode [ 1247.466781][ T8710] wireguard15: entered allmulticast mode [ 1247.553026][ T8714] wireguard12: entered promiscuous mode [ 1247.558745][ T8714] wireguard12: entered allmulticast mode 03:19:32 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef670300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:32 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef006800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:32 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904207ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1247.755237][ T8719] wireguard15: entered promiscuous mode [ 1247.760819][ T8719] wireguard15: entered allmulticast mode [ 1247.849557][ T8722] wireguard12: entered promiscuous mode [ 1247.855237][ T8722] wireguard12: entered allmulticast mode 03:19:33 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x1502, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:33 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef6a0300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:33 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef006c00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:33 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904209ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1247.990641][ T8731] __nla_validate_parse: 23 callbacks suppressed [ 1247.990654][ T8731] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:19:33 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 33) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1248.078272][ T8731] wireguard15: entered promiscuous mode [ 1248.083861][ T8731] wireguard15: entered allmulticast mode [ 1248.124238][ T8735] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1248.139600][ T8735] wireguard12: entered promiscuous mode [ 1248.145261][ T8735] wireguard12: entered allmulticast mode [ 1248.163228][ T8743] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1248.172500][ T8743] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1248.183535][ T8743] FAULT_INJECTION: forcing a failure. [ 1248.183535][ T8743] name failslab, interval 1, probability 0, space 0, times 0 [ 1248.196270][ T8743] CPU: 1 PID: 8743 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1248.206671][ T8743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1248.216799][ T8743] Call Trace: [ 1248.220071][ T8743] [ 1248.223045][ T8743] dump_stack_lvl+0xda/0x130 [ 1248.227652][ T8743] dump_stack+0x15/0x20 [ 1248.231814][ T8743] should_fail_ex+0x21f/0x230 [ 1248.236510][ T8743] ? register_netdevice+0x158/0xd60 [ 1248.241719][ T8743] __should_failslab+0x92/0xa0 [ 1248.246497][ T8743] should_failslab+0x9/0x20 [ 1248.251028][ T8743] __kmem_cache_alloc_node+0x4e/0x210 [ 1248.256479][ T8743] ? register_netdevice+0x158/0xd60 [ 1248.261703][ T8743] kmalloc_trace+0x2a/0xa0 [ 1248.266174][ T8743] register_netdevice+0x158/0xd60 [ 1248.271233][ T8743] ? __alloc_percpu+0x24/0x30 [ 1248.276245][ T8743] ? wg_packet_queue_init+0x2db/0x300 [ 1248.281764][ T8743] ? mutex_lock+0xd/0x30 [ 1248.286016][ T8743] wg_newlink+0x3b2/0x580 [ 1248.290355][ T8743] ? wg_setup+0x1d0/0x1d0 [ 1248.294687][ T8743] rtnl_newlink+0xee5/0x1670 [ 1248.299369][ T8743] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1248.305748][ T8743] ? _raw_spin_unlock+0x26/0x40 [ 1248.310623][ T8743] ? __mutex_lock+0x21c/0x8d0 [ 1248.315323][ T8743] ? rtnl_setlink+0x300/0x300 [ 1248.320038][ T8743] rtnetlink_rcv_msg+0x807/0x8c0 [ 1248.324994][ T8743] ? memcg_list_lru_alloc+0xd5/0x750 [ 1248.330363][ T8743] ? mod_objcg_state+0x357/0x580 [ 1248.335338][ T8743] ? slab_post_alloc_hook+0x82/0x2f0 [ 1248.340628][ T8743] ? kmem_cache_free+0x1d9/0x380 [ 1248.345625][ T8743] ? __kfree_skb+0x104/0x140 [ 1248.350216][ T8743] ? nlmon_xmit+0x4b/0x60 [ 1248.354552][ T8743] ? __kfree_skb+0x104/0x140 [ 1248.359143][ T8743] ? consume_skb+0x57/0x180 [ 1248.363723][ T8743] ? nlmon_xmit+0x4b/0x60 [ 1248.368048][ T8743] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1248.373404][ T8743] ? __dev_queue_xmit+0xaae/0x1d80 [ 1248.378524][ T8743] ? ref_tracker_free+0x3a1/0x400 [ 1248.383576][ T8743] netlink_rcv_skb+0x126/0x220 [ 1248.388340][ T8743] ? rtnetlink_bind+0x60/0x60 [ 1248.393063][ T8743] rtnetlink_rcv+0x1c/0x20 [ 1248.397491][ T8743] netlink_unicast+0x589/0x650 [ 1248.402338][ T8743] netlink_sendmsg+0x66e/0x770 [ 1248.407117][ T8743] ? netlink_getsockopt+0x3e0/0x3e0 [ 1248.412317][ T8743] ____sys_sendmsg+0x37c/0x4d0 [ 1248.417181][ T8743] __sys_sendmsg+0x1e9/0x270 [ 1248.421786][ T8743] __x64_sys_sendmsg+0x46/0x50 [ 1248.426999][ T8743] do_syscall_64+0x44/0x110 [ 1248.431652][ T8743] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1248.437556][ T8743] RIP: 0033:0x7efd2e8d0ce9 [ 1248.441970][ T8743] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1248.461630][ T8743] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1248.470127][ T8743] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1248.478102][ T8743] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1248.486116][ T8743] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1248.494090][ T8743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1248.502063][ T8743] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1248.510122][ T8743] 03:19:33 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef700300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:33 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) (async) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'pim6reg1\x00'}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x11}, 0x8c0) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) (async) mlockall(0x1) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) mlockall(0x2) (async) mlockall(0x2) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000002c0), r3) sendmsg$NLBL_MGMT_C_ADDDEF(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r4, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev}]}, 0x44}}, 0x0) sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x48, r4, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @empty}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x48}, 0x1, 0x0, 0x0, 0x48000}, 0x1) shmctl$SHM_UNLOCK(r1, 0xc) (async) shmctl$SHM_UNLOCK(r1, 0xc) shmget(0x2, 0x2000, 0x40, &(0x7f0000ffd000/0x2000)=nil) (async) r5 = shmget(0x2, 0x2000, 0x40, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r5, 0xb) shmat(r1, &(0x7f0000ffa000/0x3000)=nil, 0x5000) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) shmat(0xffffffffffffffff, &(0x7f0000ff8000/0x4000)=nil, 0x4000) 03:19:33 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef007400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1248.710541][ T8750] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1248.753745][ T8750] wireguard15: entered promiscuous mode [ 1248.759396][ T8750] wireguard15: entered allmulticast mode [ 1248.819759][ T8758] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:19:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 34) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1248.866879][ T8758] wireguard12: entered promiscuous mode [ 1248.872597][ T8758] wireguard12: entered allmulticast mode [ 1249.066253][ T8762] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1249.075500][ T8762] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1249.098524][ T8762] FAULT_INJECTION: forcing a failure. [ 1249.098524][ T8762] name failslab, interval 1, probability 0, space 0, times 0 [ 1249.111184][ T8762] CPU: 0 PID: 8762 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1249.121593][ T8762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1249.131651][ T8762] Call Trace: [ 1249.134929][ T8762] [ 1249.137858][ T8762] dump_stack_lvl+0xda/0x130 [ 1249.142498][ T8762] dump_stack+0x15/0x20 [ 1249.146769][ T8762] should_fail_ex+0x21f/0x230 [ 1249.151577][ T8762] ? kstrdup_const+0x3e/0x50 [ 1249.156198][ T8762] __should_failslab+0x92/0xa0 [ 1249.161150][ T8762] should_failslab+0x9/0x20 [ 1249.165703][ T8762] __kmem_cache_alloc_node+0x4e/0x210 [ 1249.171088][ T8762] ? xas_store+0x835/0xc90 [ 1249.175580][ T8762] ? kstrdup_const+0x3e/0x50 [ 1249.180176][ T8762] __kmalloc_node_track_caller+0x96/0x1a0 [ 1249.185935][ T8762] ? strcmp+0x21/0x50 [ 1249.189977][ T8762] kstrdup+0x3a/0x70 [ 1249.193956][ T8762] kstrdup_const+0x3e/0x50 [ 1249.198446][ T8762] kvasprintf_const+0xe5/0xf0 [ 1249.203161][ T8762] kobject_set_name_vargs+0x44/0xe0 [ 1249.208397][ T8762] dev_set_name+0x84/0xb0 [ 1249.212741][ T8762] ? hrtimer_init+0x104/0x1f0 [ 1249.217455][ T8762] ? netdev_register_kobject+0x63/0x230 [ 1249.223031][ T8762] ? device_initialize+0x1fe/0x210 [ 1249.228193][ T8762] netdev_register_kobject+0x7c/0x230 [ 1249.233722][ T8762] register_netdevice+0x86f/0xd60 [ 1249.238764][ T8762] ? mutex_lock+0xd/0x30 [ 1249.243098][ T8762] wg_newlink+0x3b2/0x580 [ 1249.247608][ T8762] ? wg_setup+0x1d0/0x1d0 [ 1249.251944][ T8762] rtnl_newlink+0xee5/0x1670 [ 1249.256553][ T8762] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1249.262903][ T8762] ? _raw_spin_unlock+0x26/0x40 [ 1249.267758][ T8762] ? __mutex_lock+0x21c/0x8d0 [ 1249.272446][ T8762] ? rtnl_setlink+0x300/0x300 [ 1249.277137][ T8762] rtnetlink_rcv_msg+0x807/0x8c0 [ 1249.282077][ T8762] ? memcg_list_lru_alloc+0xd5/0x750 [ 1249.287411][ T8762] ? mod_objcg_state+0x357/0x580 [ 1249.292425][ T8762] ? slab_post_alloc_hook+0x82/0x2f0 [ 1249.297723][ T8762] ? kmem_cache_free+0x1d9/0x380 [ 1249.302671][ T8762] ? __kfree_skb+0x104/0x140 [ 1249.307318][ T8762] ? nlmon_xmit+0x4b/0x60 [ 1249.311654][ T8762] ? __kfree_skb+0x104/0x140 [ 1249.316244][ T8762] ? consume_skb+0x57/0x180 [ 1249.320808][ T8762] ? nlmon_xmit+0x4b/0x60 [ 1249.325176][ T8762] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1249.330465][ T8762] ? __dev_queue_xmit+0xaae/0x1d80 [ 1249.335650][ T8762] ? ref_tracker_free+0x3a1/0x400 [ 1249.340763][ T8762] netlink_rcv_skb+0x126/0x220 [ 1249.345527][ T8762] ? rtnetlink_bind+0x60/0x60 [ 1249.350247][ T8762] rtnetlink_rcv+0x1c/0x20 [ 1249.354701][ T8762] netlink_unicast+0x589/0x650 [ 1249.359524][ T8762] netlink_sendmsg+0x66e/0x770 [ 1249.364290][ T8762] ? netlink_getsockopt+0x3e0/0x3e0 [ 1249.369492][ T8762] ____sys_sendmsg+0x37c/0x4d0 [ 1249.374324][ T8762] __sys_sendmsg+0x1e9/0x270 [ 1249.379103][ T8762] __x64_sys_sendmsg+0x46/0x50 [ 1249.383877][ T8762] do_syscall_64+0x44/0x110 [ 1249.388455][ T8762] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1249.394355][ T8762] RIP: 0033:0x7efd2e8d0ce9 [ 1249.398846][ T8762] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1249.418474][ T8762] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1249.426971][ T8762] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1249.434983][ T8762] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1249.442951][ T8762] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1249.451008][ T8762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1249.459058][ T8762] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1249.467087][ T8762] 03:19:34 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef780300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:34 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0f7400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1249.536561][ T8766] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1249.587077][ T8766] wireguard15: entered promiscuous mode [ 1249.592711][ T8766] wireguard15: entered allmulticast mode [ 1249.632418][ T8768] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1249.656358][ T8768] wireguard12: entered promiscuous mode [ 1249.661962][ T8768] wireguard12: entered allmulticast mode 03:19:34 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef810300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1249.828188][ T8774] wireguard15: entered promiscuous mode [ 1249.833805][ T8774] wireguard15: entered allmulticast mode 03:19:35 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x1d00, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 35) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:35 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef027800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1250.188370][ T8783] wireguard12: entered promiscuous mode [ 1250.194074][ T8783] wireguard12: entered allmulticast mode [ 1250.230840][ T8786] FAULT_INJECTION: forcing a failure. [ 1250.230840][ T8786] name failslab, interval 1, probability 0, space 0, times 0 [ 1250.243595][ T8786] CPU: 1 PID: 8786 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1250.253999][ T8786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1250.264081][ T8786] Call Trace: [ 1250.267356][ T8786] [ 1250.270286][ T8786] dump_stack_lvl+0xda/0x130 [ 1250.274894][ T8786] dump_stack+0x15/0x20 [ 1250.279062][ T8786] should_fail_ex+0x21f/0x230 [ 1250.283748][ T8786] ? device_add+0x88/0x8b0 [ 1250.288362][ T8786] __should_failslab+0x92/0xa0 [ 1250.293144][ T8786] should_failslab+0x9/0x20 [ 1250.297714][ T8786] __kmem_cache_alloc_node+0x4e/0x210 [ 1250.303193][ T8786] ? kobject_set_name_vargs+0xc0/0xe0 [ 1250.308577][ T8786] ? device_add+0x88/0x8b0 [ 1250.313009][ T8786] kmalloc_trace+0x2a/0xa0 [ 1250.317503][ T8786] device_add+0x88/0x8b0 [ 1250.321756][ T8786] netdev_register_kobject+0xfc/0x230 [ 1250.327179][ T8786] register_netdevice+0x86f/0xd60 [ 1250.332295][ T8786] ? mutex_lock+0xd/0x30 [ 1250.336545][ T8786] wg_newlink+0x3b2/0x580 [ 1250.340882][ T8786] ? wg_setup+0x1d0/0x1d0 [ 1250.345321][ T8786] rtnl_newlink+0xee5/0x1670 [ 1250.349965][ T8786] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1250.356225][ T8786] ? _raw_spin_unlock+0x26/0x40 [ 1250.361069][ T8786] ? __mutex_lock+0x21c/0x8d0 [ 1250.365770][ T8786] ? rtnl_setlink+0x300/0x300 [ 1250.370575][ T8786] rtnetlink_rcv_msg+0x807/0x8c0 [ 1250.375517][ T8786] ? memcg_list_lru_alloc+0xd5/0x750 [ 1250.380879][ T8786] ? mod_objcg_state+0x357/0x580 [ 1250.385833][ T8786] ? slab_post_alloc_hook+0x82/0x2f0 [ 1250.391197][ T8786] ? kmem_cache_free+0x1d9/0x380 [ 1250.396148][ T8786] ? __kfree_skb+0x104/0x140 [ 1250.400736][ T8786] ? nlmon_xmit+0x4b/0x60 [ 1250.405115][ T8786] ? __kfree_skb+0x104/0x140 [ 1250.409773][ T8786] ? consume_skb+0x57/0x180 [ 1250.414269][ T8786] ? nlmon_xmit+0x4b/0x60 [ 1250.418621][ T8786] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1250.423914][ T8786] ? __dev_queue_xmit+0xaae/0x1d80 [ 1250.429088][ T8786] ? ref_tracker_free+0x3a1/0x400 [ 1250.434191][ T8786] netlink_rcv_skb+0x126/0x220 [ 1250.438949][ T8786] ? rtnetlink_bind+0x60/0x60 [ 1250.443710][ T8786] rtnetlink_rcv+0x1c/0x20 [ 1250.448213][ T8786] netlink_unicast+0x589/0x650 [ 1250.452987][ T8786] netlink_sendmsg+0x66e/0x770 [ 1250.457748][ T8786] ? netlink_getsockopt+0x3e0/0x3e0 [ 1250.463019][ T8786] ____sys_sendmsg+0x37c/0x4d0 [ 1250.467794][ T8786] __sys_sendmsg+0x1e9/0x270 [ 1250.472433][ T8786] __x64_sys_sendmsg+0x46/0x50 [ 1250.477198][ T8786] do_syscall_64+0x44/0x110 [ 1250.481773][ T8786] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1250.487745][ T8786] RIP: 0033:0x7efd2e8d0ce9 [ 1250.492244][ T8786] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1250.511882][ T8786] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1250.520350][ T8786] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1250.528355][ T8786] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1250.536365][ T8786] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1250.544335][ T8786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1250.552304][ T8786] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1250.560283][ T8786] 03:19:36 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd73530881590420dffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:36 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef830300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:36 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'pim6reg1\x00'}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x11}, 0x8c0) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) mlockall(0x2) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000002c0), r3) sendmsg$NLBL_MGMT_C_ADDDEF(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r4, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev}]}, 0x44}}, 0x0) sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x48, r4, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @empty}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x48}, 0x1, 0x0, 0x0, 0x48000}, 0x1) shmctl$SHM_UNLOCK(r1, 0xc) r5 = shmget(0x2, 0x2000, 0x40, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r5, 0xb) shmat(r1, &(0x7f0000ffa000/0x3000)=nil, 0x5000) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) shmat(0xffffffffffffffff, &(0x7f0000ff8000/0x4000)=nil, 0x4000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'pim6reg1\x00'}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x11}, 0x8c0) (async) shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) (async) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) (async) mlockall(0x2) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000002c0), r3) (async) sendmsg$NLBL_MGMT_C_ADDDEF(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r4, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev}]}, 0x44}}, 0x0) (async) sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x48, r4, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @empty}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x48}, 0x1, 0x0, 0x0, 0x48000}, 0x1) (async) shmctl$SHM_UNLOCK(r1, 0xc) (async) shmget(0x2, 0x2000, 0x40, &(0x7f0000ffd000/0x2000)=nil) (async) shmctl$SHM_LOCK(r5, 0xb) (async) shmat(r1, &(0x7f0000ffa000/0x3000)=nil, 0x5000) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) (async) shmat(0xffffffffffffffff, &(0x7f0000ff8000/0x4000)=nil, 0x4000) (async) 03:19:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 36) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:36 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef037800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:36 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x1f00, 0x0, 0x0, 0x0) mlockall(0x0) [ 1251.493726][ T8797] wireguard12: entered promiscuous mode [ 1251.499344][ T8797] wireguard12: entered allmulticast mode [ 1251.561623][ T8796] wireguard15: entered promiscuous mode [ 1251.567318][ T8796] wireguard15: entered allmulticast mode [ 1251.633377][ T8804] FAULT_INJECTION: forcing a failure. [ 1251.633377][ T8804] name failslab, interval 1, probability 0, space 0, times 0 [ 1251.646047][ T8804] CPU: 0 PID: 8804 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1251.656374][ T8804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1251.666484][ T8804] Call Trace: [ 1251.669814][ T8804] [ 1251.672737][ T8804] dump_stack_lvl+0xda/0x130 [ 1251.677350][ T8804] dump_stack+0x15/0x20 [ 1251.681583][ T8804] should_fail_ex+0x21f/0x230 [ 1251.686277][ T8804] ? kstrdup_const+0x3e/0x50 [ 1251.690874][ T8804] __should_failslab+0x92/0xa0 [ 1251.695730][ T8804] should_failslab+0x9/0x20 [ 1251.700326][ T8804] __kmem_cache_alloc_node+0x4e/0x210 [ 1251.705710][ T8804] ? kstrdup_const+0x3e/0x50 [ 1251.710304][ T8804] __kmalloc_node_track_caller+0x96/0x1a0 [ 1251.716036][ T8804] kstrdup+0x3a/0x70 [ 1251.719932][ T8804] kstrdup_const+0x3e/0x50 [ 1251.724418][ T8804] __kernfs_new_node+0x41/0x380 [ 1251.729271][ T8804] ? make_kgid+0x115/0x310 [ 1251.733803][ T8804] ? net_ns_get_ownership+0xae/0xd0 [ 1251.739011][ T8804] ? net_namespace+0x20/0x20 [ 1251.743681][ T8804] kernfs_create_dir_ns+0x62/0x150 [ 1251.748875][ T8804] sysfs_create_dir_ns+0xd7/0x1d0 [ 1251.753917][ T8804] kobject_add_internal+0x3eb/0x730 [ 1251.759127][ T8804] kobject_add+0xdc/0x150 [ 1251.763461][ T8804] ? kobject_get+0x95/0xc0 [ 1251.767934][ T8804] ? device_add+0x2ea/0x8b0 [ 1251.772457][ T8804] device_add+0x2f8/0x8b0 [ 1251.776885][ T8804] netdev_register_kobject+0xfc/0x230 [ 1251.782271][ T8804] register_netdevice+0x86f/0xd60 [ 1251.787354][ T8804] ? mutex_lock+0xd/0x30 [ 1251.791608][ T8804] wg_newlink+0x3b2/0x580 [ 1251.796024][ T8804] ? wg_setup+0x1d0/0x1d0 [ 1251.800357][ T8804] rtnl_newlink+0xee5/0x1670 [ 1251.804969][ T8804] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1251.811212][ T8804] ? _raw_spin_unlock+0x26/0x40 [ 1251.816079][ T8804] ? __mutex_lock+0x21c/0x8d0 [ 1251.820770][ T8804] ? rtnl_setlink+0x300/0x300 [ 1251.825459][ T8804] rtnetlink_rcv_msg+0x807/0x8c0 [ 1251.830394][ T8804] ? memcg_list_lru_alloc+0xd5/0x750 [ 1251.835717][ T8804] ? mod_objcg_state+0x357/0x580 [ 1251.840685][ T8804] ? slab_post_alloc_hook+0x82/0x2f0 [ 1251.845997][ T8804] ? kmem_cache_free+0x1d9/0x380 [ 1251.850999][ T8804] ? __kfree_skb+0x104/0x140 [ 1251.855655][ T8804] ? nlmon_xmit+0x4b/0x60 [ 1251.859991][ T8804] ? __kfree_skb+0x104/0x140 [ 1251.864642][ T8804] ? consume_skb+0x57/0x180 [ 1251.869150][ T8804] ? nlmon_xmit+0x4b/0x60 [ 1251.873572][ T8804] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1251.878908][ T8804] ? __dev_queue_xmit+0xaae/0x1d80 [ 1251.884105][ T8804] ? ref_tracker_free+0x3a1/0x400 [ 1251.889140][ T8804] netlink_rcv_skb+0x126/0x220 [ 1251.893905][ T8804] ? rtnetlink_bind+0x60/0x60 [ 1251.898675][ T8804] rtnetlink_rcv+0x1c/0x20 [ 1251.903087][ T8804] netlink_unicast+0x589/0x650 [ 1251.907873][ T8804] netlink_sendmsg+0x66e/0x770 [ 1251.912636][ T8804] ? netlink_getsockopt+0x3e0/0x3e0 [ 1251.917858][ T8804] ____sys_sendmsg+0x37c/0x4d0 [ 1251.922639][ T8804] __sys_sendmsg+0x1e9/0x270 [ 1251.927239][ T8804] __x64_sys_sendmsg+0x46/0x50 [ 1251.932167][ T8804] do_syscall_64+0x44/0x110 [ 1251.936687][ T8804] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1251.942588][ T8804] RIP: 0033:0x7efd2e8d0ce9 [ 1251.947047][ T8804] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1251.966664][ T8804] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1251.975101][ T8804] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1251.983085][ T8804] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1251.991055][ T8804] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1251.999024][ T8804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1252.007068][ T8804] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1252.015105][ T8804] [ 1252.018293][ T8804] kobject: kobject_add_internal failed for wireguard19 (error: -12 parent: net) 03:19:37 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef007a00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:37 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef8c0300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:37 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904213ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 37) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1252.307275][ T8818] wireguard12: entered promiscuous mode [ 1252.312876][ T8818] wireguard12: entered allmulticast mode [ 1252.363832][ T8821] wireguard15: entered promiscuous mode [ 1252.369397][ T8821] wireguard15: entered allmulticast mode [ 1252.417399][ T8829] FAULT_INJECTION: forcing a failure. [ 1252.417399][ T8829] name failslab, interval 1, probability 0, space 0, times 0 [ 1252.430083][ T8829] CPU: 0 PID: 8829 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1252.440412][ T8829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1252.450470][ T8829] Call Trace: [ 1252.453745][ T8829] [ 1252.456754][ T8829] dump_stack_lvl+0xda/0x130 [ 1252.461370][ T8829] dump_stack+0x15/0x20 [ 1252.465613][ T8829] should_fail_ex+0x21f/0x230 [ 1252.470309][ T8829] ? __kernfs_new_node+0x6a/0x380 [ 1252.475346][ T8829] __should_failslab+0x92/0xa0 [ 1252.480190][ T8829] should_failslab+0x9/0x20 [ 1252.484698][ T8829] kmem_cache_alloc+0x4e/0x250 [ 1252.489467][ T8829] __kernfs_new_node+0x6a/0x380 [ 1252.494346][ T8829] ? make_kgid+0x115/0x310 [ 1252.498819][ T8829] ? net_ns_get_ownership+0xae/0xd0 [ 1252.504029][ T8829] ? net_namespace+0x20/0x20 [ 1252.508616][ T8829] kernfs_create_dir_ns+0x62/0x150 [ 1252.513730][ T8829] sysfs_create_dir_ns+0xd7/0x1d0 [ 1252.518754][ T8829] kobject_add_internal+0x3eb/0x730 [ 1252.524054][ T8829] kobject_add+0xdc/0x150 [ 1252.528391][ T8829] ? kobject_get+0x95/0xc0 [ 1252.532874][ T8829] ? device_add+0x2ea/0x8b0 [ 1252.537449][ T8829] device_add+0x2f8/0x8b0 [ 1252.541874][ T8829] netdev_register_kobject+0xfc/0x230 [ 1252.547380][ T8829] register_netdevice+0x86f/0xd60 [ 1252.552421][ T8829] ? mutex_lock+0xd/0x30 [ 1252.556717][ T8829] wg_newlink+0x3b2/0x580 [ 1252.561049][ T8829] ? wg_setup+0x1d0/0x1d0 [ 1252.565376][ T8829] rtnl_newlink+0xee5/0x1670 [ 1252.570032][ T8829] ? security_capable+0x5e/0x80 [ 1252.574899][ T8829] ? ns_capable+0x7c/0xb0 [ 1252.579305][ T8829] ? rtnl_setlink+0x300/0x300 [ 1252.584113][ T8829] rtnetlink_rcv_msg+0x807/0x8c0 [ 1252.589109][ T8829] ? memcg_list_lru_alloc+0xd5/0x750 [ 1252.594487][ T8829] ? mod_objcg_state+0x357/0x580 [ 1252.599486][ T8829] ? slab_post_alloc_hook+0x82/0x2f0 [ 1252.604785][ T8829] ? kmem_cache_free+0x1d9/0x380 [ 1252.609725][ T8829] ? __kfree_skb+0x104/0x140 [ 1252.614351][ T8829] ? nlmon_xmit+0x4b/0x60 [ 1252.618691][ T8829] ? __kfree_skb+0x104/0x140 [ 1252.623923][ T8829] ? consume_skb+0x57/0x180 [ 1252.628439][ T8829] ? nlmon_xmit+0x4b/0x60 [ 1252.632879][ T8829] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1252.638254][ T8829] ? __dev_queue_xmit+0xaae/0x1d80 [ 1252.643378][ T8829] ? ref_tracker_free+0x3a1/0x400 [ 1252.648435][ T8829] netlink_rcv_skb+0x126/0x220 [ 1252.653219][ T8829] ? rtnetlink_bind+0x60/0x60 [ 1252.657906][ T8829] rtnetlink_rcv+0x1c/0x20 [ 1252.662363][ T8829] netlink_unicast+0x589/0x650 [ 1252.667270][ T8829] netlink_sendmsg+0x66e/0x770 [ 1252.672137][ T8829] ? netlink_getsockopt+0x3e0/0x3e0 [ 1252.677396][ T8829] ____sys_sendmsg+0x37c/0x4d0 [ 1252.682282][ T8829] __sys_sendmsg+0x1e9/0x270 [ 1252.686878][ T8829] __x64_sys_sendmsg+0x46/0x50 [ 1252.691718][ T8829] do_syscall_64+0x44/0x110 [ 1252.696305][ T8829] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1252.702271][ T8829] RIP: 0033:0x7efd2e8d0ce9 [ 1252.706684][ T8829] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1252.726343][ T8829] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1252.734825][ T8829] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1252.742797][ T8829] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1252.750843][ T8829] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1252.758925][ T8829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:19:37 executing program 4: shmctl$IPC_RMID(0x0, 0x0) r0 = shmget$private(0x0, 0x1000, 0x2, &(0x7f0000ffd000/0x1000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) shmat(r0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) mlockall(0xb) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:19:37 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef017e00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1252.766891][ T8829] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1252.774914][ T8829] [ 1252.778116][ T8829] kobject: kobject_add_internal failed for wireguard19 (error: -12 parent: net) 03:19:38 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef960300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1252.874739][ T8836] wireguard12: entered promiscuous mode [ 1252.880359][ T8836] wireguard12: entered allmulticast mode [ 1252.956566][ T8840] wireguard15: entered promiscuous mode [ 1252.962151][ T8840] wireguard15: entered allmulticast mode 03:19:38 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x3900, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:38 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904218ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:38 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef008100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:38 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefac0300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 38) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1253.157231][ T8851] __nla_validate_parse: 14 callbacks suppressed [ 1253.157245][ T8851] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1253.222830][ T8851] wireguard12: entered promiscuous mode [ 1253.228443][ T8851] wireguard12: entered allmulticast mode [ 1253.310081][ T8854] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1253.356234][ T8854] wireguard15: entered promiscuous mode [ 1253.361818][ T8854] wireguard15: entered allmulticast mode [ 1253.395154][ T8860] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1253.404405][ T8860] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1253.416628][ T8860] wireguard19: entered promiscuous mode [ 1253.422181][ T8860] wireguard19: entered allmulticast mode 03:19:38 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefb60300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:38 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef038100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1253.516764][ T8866] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:19:38 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904228ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1253.574536][ T8866] wireguard15: entered promiscuous mode [ 1253.580123][ T8866] wireguard15: entered allmulticast mode [ 1253.671026][ T8869] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1253.712224][ T8869] wireguard12: entered promiscuous mode [ 1253.717897][ T8869] wireguard12: entered allmulticast mode 03:19:39 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefce0300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:39 executing program 4: shmctl$IPC_RMID(0x0, 0x0) r0 = shmget$private(0x0, 0x1000, 0x2, &(0x7f0000ffd000/0x1000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) (async) shmat(r0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) mlockall(0xb) (async) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:19:39 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef028200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1253.916690][ T8879] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1253.948602][ T8879] wireguard15: entered promiscuous mode [ 1253.954275][ T8879] wireguard15: entered allmulticast mode 03:19:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 39) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1254.007518][ T8881] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1254.029072][ T8881] wireguard12: entered promiscuous mode [ 1254.034723][ T8881] wireguard12: entered allmulticast mode [ 1254.195797][ T8892] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1254.205212][ T8892] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1254.221933][ T8892] FAULT_INJECTION: forcing a failure. [ 1254.221933][ T8892] name failslab, interval 1, probability 0, space 0, times 0 [ 1254.234583][ T8892] CPU: 1 PID: 8892 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1254.245077][ T8892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1254.255214][ T8892] Call Trace: [ 1254.258531][ T8892] [ 1254.261456][ T8892] dump_stack_lvl+0xda/0x130 [ 1254.266129][ T8892] dump_stack+0x15/0x20 [ 1254.270345][ T8892] should_fail_ex+0x21f/0x230 [ 1254.275061][ T8892] ? __kernfs_new_node+0x6a/0x380 [ 1254.280144][ T8892] __should_failslab+0x92/0xa0 [ 1254.284968][ T8892] should_failslab+0x9/0x20 [ 1254.289529][ T8892] kmem_cache_alloc+0x4e/0x250 [ 1254.294291][ T8892] ? rb_insert_color+0x280/0x290 [ 1254.299236][ T8892] __kernfs_new_node+0x6a/0x380 [ 1254.304098][ T8892] ? kernfs_add_one+0x330/0x390 [ 1254.308949][ T8892] kernfs_new_node+0x5f/0xd0 [ 1254.313555][ T8892] kernfs_create_link+0x6c/0x120 [ 1254.318508][ T8892] sysfs_do_create_link_sd+0x6b/0xf0 [ 1254.323804][ T8892] sysfs_create_link+0x51/0x70 [ 1254.328647][ T8892] device_add_class_symlinks+0x9a/0x1e0 [ 1254.334302][ T8892] device_add+0x410/0x8b0 [ 1254.338651][ T8892] netdev_register_kobject+0xfc/0x230 [ 1254.344196][ T8892] register_netdevice+0x86f/0xd60 [ 1254.349259][ T8892] ? mutex_lock+0xd/0x30 [ 1254.353587][ T8892] wg_newlink+0x3b2/0x580 [ 1254.357940][ T8892] ? wg_setup+0x1d0/0x1d0 [ 1254.362270][ T8892] rtnl_newlink+0xee5/0x1670 [ 1254.366883][ T8892] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1254.373127][ T8892] ? _raw_spin_unlock+0x26/0x40 [ 1254.378003][ T8892] ? __mutex_lock+0x21c/0x8d0 [ 1254.382691][ T8892] ? rtnl_setlink+0x300/0x300 [ 1254.387498][ T8892] rtnetlink_rcv_msg+0x807/0x8c0 [ 1254.392438][ T8892] ? memcg_list_lru_alloc+0xd5/0x750 [ 1254.397785][ T8892] ? security_inode_alloc+0x32/0xd0 [ 1254.403044][ T8892] ? slab_post_alloc_hook+0x82/0x2f0 [ 1254.408348][ T8892] ? kmem_cache_free+0x1d9/0x380 [ 1254.413334][ T8892] ? __kfree_skb+0x104/0x140 [ 1254.418055][ T8892] ? nlmon_xmit+0x4b/0x60 [ 1254.422389][ T8892] ? __kfree_skb+0x104/0x140 [ 1254.426975][ T8892] ? consume_skb+0x57/0x180 [ 1254.431500][ T8892] ? nlmon_xmit+0x4b/0x60 [ 1254.435832][ T8892] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1254.441162][ T8892] ? __dev_queue_xmit+0xaae/0x1d80 [ 1254.446284][ T8892] ? ref_tracker_free+0x3a1/0x400 [ 1254.451324][ T8892] netlink_rcv_skb+0x126/0x220 [ 1254.456091][ T8892] ? rtnetlink_bind+0x60/0x60 [ 1254.460776][ T8892] rtnetlink_rcv+0x1c/0x20 [ 1254.465242][ T8892] netlink_unicast+0x589/0x650 [ 1254.470065][ T8892] netlink_sendmsg+0x66e/0x770 [ 1254.474832][ T8892] ? netlink_getsockopt+0x3e0/0x3e0 [ 1254.480138][ T8892] ____sys_sendmsg+0x37c/0x4d0 [ 1254.484903][ T8892] __sys_sendmsg+0x1e9/0x270 [ 1254.489506][ T8892] __x64_sys_sendmsg+0x46/0x50 [ 1254.494301][ T8892] do_syscall_64+0x44/0x110 [ 1254.498864][ T8892] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1254.504820][ T8892] RIP: 0033:0x7efd2e8d0ce9 [ 1254.509289][ T8892] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1254.528897][ T8892] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1254.537313][ T8892] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1254.545285][ T8892] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1254.553323][ T8892] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1254.561378][ T8892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1254.569345][ T8892] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1254.577399][ T8892] 03:19:39 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xc800, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:39 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefe00300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:39 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef038300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:39 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904262ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1254.872594][ T8900] wireguard12: entered promiscuous mode [ 1254.878226][ T8900] wireguard12: entered allmulticast mode 03:19:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 40) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:40 executing program 4: shmctl$IPC_RMID(0x0, 0x0) r0 = shmget$private(0x0, 0x1000, 0x2, &(0x7f0000ffd000/0x1000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) (async) shmat(r0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) (async) mlockall(0xb) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 1254.973932][ T8897] wireguard15: entered promiscuous mode [ 1254.979527][ T8897] wireguard15: entered allmulticast mode [ 1255.154192][ T8908] FAULT_INJECTION: forcing a failure. [ 1255.154192][ T8908] name failslab, interval 1, probability 0, space 0, times 0 [ 1255.166875][ T8908] CPU: 1 PID: 8908 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1255.177239][ T8908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1255.187294][ T8908] Call Trace: [ 1255.190565][ T8908] [ 1255.193546][ T8908] dump_stack_lvl+0xda/0x130 [ 1255.198152][ T8908] dump_stack+0x15/0x20 [ 1255.202322][ T8908] should_fail_ex+0x21f/0x230 [ 1255.207078][ T8908] ? __kernfs_new_node+0x6a/0x380 [ 1255.212164][ T8908] __should_failslab+0x92/0xa0 [ 1255.216957][ T8908] should_failslab+0x9/0x20 [ 1255.221496][ T8908] kmem_cache_alloc+0x4e/0x250 [ 1255.226276][ T8908] ? rb_insert_color+0x280/0x290 [ 1255.231226][ T8908] __kernfs_new_node+0x6a/0x380 [ 1255.236084][ T8908] ? kernfs_add_one+0x330/0x390 [ 1255.240989][ T8908] kernfs_new_node+0x5f/0xd0 [ 1255.245581][ T8908] kernfs_create_link+0x6c/0x120 [ 1255.250587][ T8908] sysfs_do_create_link_sd+0x6b/0xf0 [ 1255.255892][ T8908] sysfs_create_link+0x51/0x70 [ 1255.260657][ T8908] device_add_class_symlinks+0x9a/0x1e0 [ 1255.266254][ T8908] device_add+0x410/0x8b0 [ 1255.270659][ T8908] netdev_register_kobject+0xfc/0x230 [ 1255.276042][ T8908] register_netdevice+0x86f/0xd60 [ 1255.281122][ T8908] ? mutex_lock+0xd/0x30 [ 1255.285401][ T8908] wg_newlink+0x3b2/0x580 [ 1255.289735][ T8908] ? wg_setup+0x1d0/0x1d0 [ 1255.294071][ T8908] rtnl_newlink+0xee5/0x1670 [ 1255.298683][ T8908] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1255.304926][ T8908] ? _raw_spin_unlock+0x26/0x40 [ 1255.309779][ T8908] ? __mutex_lock+0x21c/0x8d0 [ 1255.314551][ T8908] ? rtnl_setlink+0x300/0x300 [ 1255.319234][ T8908] rtnetlink_rcv_msg+0x807/0x8c0 [ 1255.324175][ T8908] ? memcg_list_lru_alloc+0xd5/0x750 [ 1255.329556][ T8908] ? mod_objcg_state+0x357/0x580 [ 1255.334500][ T8908] ? slab_post_alloc_hook+0x82/0x2f0 [ 1255.339836][ T8908] ? kmem_cache_free+0x1d9/0x380 [ 1255.344844][ T8908] ? __kfree_skb+0x104/0x140 [ 1255.349506][ T8908] ? nlmon_xmit+0x4b/0x60 [ 1255.353838][ T8908] ? __kfree_skb+0x104/0x140 [ 1255.358426][ T8908] ? consume_skb+0x57/0x180 [ 1255.362956][ T8908] ? nlmon_xmit+0x4b/0x60 [ 1255.367300][ T8908] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1255.372597][ T8908] ? __dev_queue_xmit+0xaae/0x1d80 [ 1255.377713][ T8908] ? ref_tracker_free+0x3a1/0x400 [ 1255.382785][ T8908] netlink_rcv_skb+0x126/0x220 [ 1255.387553][ T8908] ? rtnetlink_bind+0x60/0x60 [ 1255.392238][ T8908] rtnetlink_rcv+0x1c/0x20 [ 1255.396675][ T8908] netlink_unicast+0x589/0x650 [ 1255.401452][ T8908] netlink_sendmsg+0x66e/0x770 [ 1255.406298][ T8908] ? netlink_getsockopt+0x3e0/0x3e0 [ 1255.411542][ T8908] ____sys_sendmsg+0x37c/0x4d0 [ 1255.416313][ T8908] __sys_sendmsg+0x1e9/0x270 [ 1255.420902][ T8908] __x64_sys_sendmsg+0x46/0x50 [ 1255.425762][ T8908] do_syscall_64+0x44/0x110 [ 1255.430274][ T8908] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1255.436176][ T8908] RIP: 0033:0x7efd2e8d0ce9 [ 1255.440615][ T8908] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1255.460293][ T8908] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1255.468722][ T8908] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1255.476758][ T8908] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1255.484728][ T8908] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1255.492781][ T8908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:19:40 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef018600000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1255.500769][ T8908] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1255.508744][ T8908] 03:19:40 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefec0300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 41) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1255.768700][ T8923] wireguard12: entered promiscuous mode [ 1255.774410][ T8923] wireguard12: entered allmulticast mode [ 1255.824521][ T8922] wireguard15: entered promiscuous mode [ 1255.830170][ T8922] wireguard15: entered allmulticast mode [ 1255.935946][ T8933] FAULT_INJECTION: forcing a failure. [ 1255.935946][ T8933] name failslab, interval 1, probability 0, space 0, times 0 [ 1255.948602][ T8933] CPU: 1 PID: 8933 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1255.959062][ T8933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1255.969109][ T8933] Call Trace: [ 1255.972386][ T8933] [ 1255.975315][ T8933] dump_stack_lvl+0xda/0x130 [ 1255.979917][ T8933] dump_stack+0x15/0x20 [ 1255.984110][ T8933] should_fail_ex+0x21f/0x230 [ 1255.988796][ T8933] ? kstrdup_const+0x3e/0x50 [ 1255.993395][ T8933] __should_failslab+0x92/0xa0 [ 1255.998343][ T8933] should_failslab+0x9/0x20 [ 1256.002917][ T8933] __kmem_cache_alloc_node+0x4e/0x210 [ 1256.008357][ T8933] ? kernfs_xattr_get+0x67/0x80 [ 1256.013235][ T8933] ? kstrdup_const+0x3e/0x50 [ 1256.017871][ T8933] __kmalloc_node_track_caller+0x96/0x1a0 [ 1256.023605][ T8933] kstrdup+0x3a/0x70 [ 1256.027580][ T8933] kstrdup_const+0x3e/0x50 [ 1256.032125][ T8933] __kernfs_new_node+0x41/0x380 [ 1256.036981][ T8933] ? rb_insert_color+0x6a/0x290 [ 1256.041856][ T8933] ? up_write+0x30/0xe0 [ 1256.046040][ T8933] ? kernfs_activate+0x252/0x270 [ 1256.050980][ T8933] kernfs_new_node+0x5f/0xd0 [ 1256.055636][ T8933] kernfs_create_link+0x6c/0x120 [ 1256.060646][ T8933] sysfs_do_create_link_sd+0x6b/0xf0 [ 1256.065983][ T8933] sysfs_create_link+0x51/0x70 [ 1256.070760][ T8933] device_add_class_symlinks+0x159/0x1e0 [ 1256.076536][ T8933] device_add+0x410/0x8b0 [ 1256.080879][ T8933] netdev_register_kobject+0xfc/0x230 03:19:41 executing program 4: preadv2(0xffffffffffffffff, &(0x7f00000016c0)=[{&(0x7f0000000000)=""/179, 0xb3}, {&(0x7f00000000c0)=""/235, 0xeb}, {&(0x7f00000001c0)=""/92, 0x5c}, {&(0x7f0000000240)=""/212, 0xd4}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/239, 0xef}, {&(0x7f0000000480)=""/182, 0xb6}, {&(0x7f0000000540)=""/190, 0xbe}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/152, 0x98}], 0xa, 0x2, 0x9, 0x10) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) mlockall(0x1) [ 1256.086332][ T8933] register_netdevice+0x86f/0xd60 [ 1256.091523][ T8933] ? mutex_lock+0xd/0x30 [ 1256.095777][ T8933] wg_newlink+0x3b2/0x580 [ 1256.100114][ T8933] ? wg_setup+0x1d0/0x1d0 [ 1256.104463][ T8933] rtnl_newlink+0xee5/0x1670 [ 1256.109162][ T8933] ? __mutex_lock+0x54/0x8d0 [ 1256.113776][ T8933] ? rtnl_setlink+0x300/0x300 [ 1256.118515][ T8933] rtnetlink_rcv_msg+0x807/0x8c0 [ 1256.123577][ T8933] ? memcg_list_lru_alloc+0xd5/0x750 [ 1256.128921][ T8933] ? mod_objcg_state+0x357/0x580 [ 1256.133925][ T8933] ? slab_post_alloc_hook+0x82/0x2f0 [ 1256.139355][ T8933] ? kmem_cache_free+0x1d9/0x380 [ 1256.144302][ T8933] ? __kfree_skb+0x104/0x140 [ 1256.148981][ T8933] ? nlmon_xmit+0x4b/0x60 [ 1256.153425][ T8933] ? __kfree_skb+0x104/0x140 [ 1256.158019][ T8933] ? consume_skb+0x57/0x180 [ 1256.162527][ T8933] ? nlmon_xmit+0x4b/0x60 [ 1256.166866][ T8933] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1256.172223][ T8933] ? __dev_queue_xmit+0xaae/0x1d80 [ 1256.177407][ T8933] ? ref_tracker_free+0x3a1/0x400 [ 1256.182444][ T8933] netlink_rcv_skb+0x126/0x220 [ 1256.187992][ T8933] ? rtnetlink_bind+0x60/0x60 [ 1256.192680][ T8933] rtnetlink_rcv+0x1c/0x20 [ 1256.197214][ T8933] netlink_unicast+0x589/0x650 [ 1256.202023][ T8933] netlink_sendmsg+0x66e/0x770 [ 1256.206835][ T8933] ? netlink_getsockopt+0x3e0/0x3e0 [ 1256.212035][ T8933] ____sys_sendmsg+0x37c/0x4d0 [ 1256.216807][ T8933] __sys_sendmsg+0x1e9/0x270 [ 1256.221547][ T8933] __x64_sys_sendmsg+0x46/0x50 [ 1256.226334][ T8933] do_syscall_64+0x44/0x110 [ 1256.230932][ T8933] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1256.236836][ T8933] RIP: 0033:0x7efd2e8d0ce9 [ 1256.241272][ T8933] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1256.260893][ T8933] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1256.269313][ T8933] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1256.277281][ T8933] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1256.285252][ T8933] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1256.293226][ T8933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1256.301200][ T8933] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1256.309171][ T8933] 03:19:41 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef018800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:41 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001feff90300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:41 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xcd02, 0x0, 0x0, 0x0) mlockall(0x0) [ 1256.427276][ T8939] wireguard12: entered promiscuous mode [ 1256.432880][ T8939] wireguard12: entered allmulticast mode [ 1256.501134][ T8942] wireguard15: entered promiscuous mode [ 1256.506808][ T8942] wireguard15: entered allmulticast mode 03:19:41 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef478800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1256.615890][ T8949] wireguard12: entered promiscuous mode [ 1256.621493][ T8949] wireguard12: entered allmulticast mode 03:19:41 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000500000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1256.711020][ T8952] wireguard15: entered promiscuous mode [ 1256.716637][ T8952] wireguard15: entered allmulticast mode 03:19:42 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904290ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 42) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:42 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef488800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:42 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000600000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1257.342524][ T8960] wireguard12: entered promiscuous mode [ 1257.348167][ T8960] wireguard12: entered allmulticast mode [ 1257.410899][ T8963] wireguard15: entered promiscuous mode [ 1257.416530][ T8963] wireguard15: entered allmulticast mode [ 1257.482617][ T8964] FAULT_INJECTION: forcing a failure. [ 1257.482617][ T8964] name failslab, interval 1, probability 0, space 0, times 0 [ 1257.495313][ T8964] CPU: 1 PID: 8964 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1257.505703][ T8964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1257.515788][ T8964] Call Trace: [ 1257.519067][ T8964] [ 1257.522007][ T8964] dump_stack_lvl+0xda/0x130 [ 1257.526666][ T8964] dump_stack+0x15/0x20 [ 1257.530904][ T8964] should_fail_ex+0x21f/0x230 [ 1257.535596][ T8964] ? __kernfs_new_node+0x6a/0x380 [ 1257.540628][ T8964] __should_failslab+0x92/0xa0 [ 1257.545408][ T8964] should_failslab+0x9/0x20 [ 1257.550032][ T8964] kmem_cache_alloc+0x4e/0x250 [ 1257.554810][ T8964] ? __radix_tree_replace+0x1c1/0x1f0 [ 1257.560233][ T8964] __kernfs_new_node+0x6a/0x380 [ 1257.565151][ T8964] ? __radix_tree_replace+0x1c1/0x1f0 [ 1257.570560][ T8964] ? mutex_lock+0xd/0x30 [ 1257.574886][ T8964] ? kernfs_xattr_get+0x67/0x80 [ 1257.579764][ T8964] kernfs_new_node+0x5f/0xd0 [ 1257.584360][ T8964] __kernfs_create_file+0x49/0x180 [ 1257.589550][ T8964] ? dev_attr_show+0x90/0x90 [ 1257.594147][ T8964] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1257.599577][ T8964] internal_create_group+0x2e4/0x800 [ 1257.604900][ T8964] sysfs_create_groups+0x3c/0xe0 [ 1257.609845][ T8964] device_add_attrs+0x69/0x400 [ 1257.614708][ T8964] ? kobject_put+0xd8/0x160 [ 1257.619313][ T8964] device_add+0x431/0x8b0 [ 1257.623661][ T8964] netdev_register_kobject+0xfc/0x230 [ 1257.629075][ T8964] register_netdevice+0x86f/0xd60 [ 1257.634179][ T8964] ? mutex_lock+0xd/0x30 [ 1257.638432][ T8964] wg_newlink+0x3b2/0x580 [ 1257.642822][ T8964] ? wg_setup+0x1d0/0x1d0 [ 1257.647155][ T8964] rtnl_newlink+0xee5/0x1670 [ 1257.651835][ T8964] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1257.658161][ T8964] ? _raw_spin_unlock+0x26/0x40 [ 1257.663059][ T8964] ? __mutex_lock+0x21c/0x8d0 [ 1257.667747][ T8964] ? rtnl_setlink+0x300/0x300 [ 1257.672531][ T8964] rtnetlink_rcv_msg+0x807/0x8c0 [ 1257.677470][ T8964] ? memcg_list_lru_alloc+0xd5/0x750 03:19:42 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xec00, 0x0, 0x0, 0x0) mlockall(0x0) [ 1257.682899][ T8964] ? mod_objcg_state+0x357/0x580 [ 1257.687872][ T8964] ? slab_post_alloc_hook+0x82/0x2f0 [ 1257.693272][ T8964] ? kmem_cache_free+0x1d9/0x380 [ 1257.698291][ T8964] ? __kfree_skb+0x104/0x140 [ 1257.702880][ T8964] ? nlmon_xmit+0x4b/0x60 [ 1257.707247][ T8964] ? __kfree_skb+0x104/0x140 [ 1257.711834][ T8964] ? consume_skb+0x57/0x180 [ 1257.716400][ T8964] ? nlmon_xmit+0x4b/0x60 [ 1257.720829][ T8964] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1257.726194][ T8964] ? __dev_queue_xmit+0xaae/0x1d80 [ 1257.731354][ T8964] ? ref_tracker_free+0x3a1/0x400 [ 1257.736391][ T8964] netlink_rcv_skb+0x126/0x220 [ 1257.741171][ T8964] ? rtnetlink_bind+0x60/0x60 [ 1257.745881][ T8964] rtnetlink_rcv+0x1c/0x20 [ 1257.750298][ T8964] netlink_unicast+0x589/0x650 [ 1257.755109][ T8964] netlink_sendmsg+0x66e/0x770 [ 1257.759924][ T8964] ? netlink_getsockopt+0x3e0/0x3e0 [ 1257.765212][ T8964] ____sys_sendmsg+0x37c/0x4d0 [ 1257.770139][ T8964] __sys_sendmsg+0x1e9/0x270 [ 1257.774805][ T8964] __x64_sys_sendmsg+0x46/0x50 [ 1257.779573][ T8964] do_syscall_64+0x44/0x110 [ 1257.784168][ T8964] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1257.790081][ T8964] RIP: 0033:0x7efd2e8d0ce9 [ 1257.794579][ T8964] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1257.814247][ T8964] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1257.822750][ T8964] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1257.830729][ T8964] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1257.838721][ T8964] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1257.846763][ T8964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1257.854735][ T8964] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1257.862713][ T8964] 03:19:43 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef018c00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1257.984264][ T8977] wireguard12: entered promiscuous mode [ 1257.989897][ T8977] wireguard12: entered allmulticast mode 03:19:43 executing program 4: preadv2(0xffffffffffffffff, &(0x7f00000016c0)=[{&(0x7f0000000000)=""/179, 0xb3}, {&(0x7f00000000c0)=""/235, 0xeb}, {&(0x7f00000001c0)=""/92, 0x5c}, {&(0x7f0000000240)=""/212, 0xd4}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/239, 0xef}, {&(0x7f0000000480)=""/182, 0xb6}, {&(0x7f0000000540)=""/190, 0xbe}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/152, 0x98}], 0xa, 0x2, 0x9, 0x10) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) mlockall(0x1) preadv2(0xffffffffffffffff, &(0x7f00000016c0)=[{&(0x7f0000000000)=""/179, 0xb3}, {&(0x7f00000000c0)=""/235, 0xeb}, {&(0x7f00000001c0)=""/92, 0x5c}, {&(0x7f0000000240)=""/212, 0xd4}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/239, 0xef}, {&(0x7f0000000480)=""/182, 0xb6}, {&(0x7f0000000540)=""/190, 0xbe}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/152, 0x98}], 0xa, 0x2, 0x9, 0x10) (async) shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) (async) mlockall(0x1) (async) 03:19:43 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904299ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:43 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef010600000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:43 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef029d00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 43) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1258.361023][ T8983] __nla_validate_parse: 17 callbacks suppressed [ 1258.361037][ T8983] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1258.411358][ T8983] wireguard15: entered promiscuous mode [ 1258.417120][ T8983] wireguard15: entered allmulticast mode [ 1258.445865][ T8984] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1258.488374][ T8984] wireguard12: entered promiscuous mode [ 1258.493973][ T8984] wireguard12: entered allmulticast mode [ 1258.521039][ T8994] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1258.530342][ T8994] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1258.540285][ T8994] FAULT_INJECTION: forcing a failure. [ 1258.540285][ T8994] name failslab, interval 1, probability 0, space 0, times 0 [ 1258.553025][ T8994] CPU: 1 PID: 8994 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1258.563400][ T8994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1258.573464][ T8994] Call Trace: [ 1258.576745][ T8994] [ 1258.579671][ T8994] dump_stack_lvl+0xda/0x130 [ 1258.584280][ T8994] dump_stack+0x15/0x20 [ 1258.588477][ T8994] should_fail_ex+0x21f/0x230 [ 1258.593209][ T8994] ? __kernfs_new_node+0x6a/0x380 [ 1258.598257][ T8994] __should_failslab+0x92/0xa0 [ 1258.603102][ T8994] should_failslab+0x9/0x20 [ 1258.607692][ T8994] kmem_cache_alloc+0x4e/0x250 [ 1258.612483][ T8994] ? __radix_tree_replace+0x1c1/0x1f0 [ 1258.617944][ T8994] __kernfs_new_node+0x6a/0x380 [ 1258.622872][ T8994] ? __radix_tree_replace+0x1c1/0x1f0 [ 1258.628315][ T8994] ? mutex_lock+0xd/0x30 [ 1258.632625][ T8994] ? kernfs_xattr_get+0x67/0x80 [ 1258.637612][ T8994] kernfs_new_node+0x5f/0xd0 [ 1258.642208][ T8994] __kernfs_create_file+0x49/0x180 [ 1258.647424][ T8994] ? dev_attr_show+0x90/0x90 [ 1258.652107][ T8994] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1258.657579][ T8994] internal_create_group+0x2e4/0x800 [ 1258.662878][ T8994] sysfs_create_groups+0x3c/0xe0 [ 1258.667816][ T8994] device_add_attrs+0x69/0x400 [ 1258.672632][ T8994] ? kobject_put+0xd8/0x160 [ 1258.677149][ T8994] device_add+0x431/0x8b0 [ 1258.681514][ T8994] netdev_register_kobject+0xfc/0x230 [ 1258.686904][ T8994] register_netdevice+0x86f/0xd60 [ 1258.691948][ T8994] ? mutex_lock+0xd/0x30 [ 1258.696247][ T8994] wg_newlink+0x3b2/0x580 [ 1258.700587][ T8994] ? wg_setup+0x1d0/0x1d0 [ 1258.704922][ T8994] rtnl_newlink+0xee5/0x1670 [ 1258.709593][ T8994] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1258.715849][ T8994] ? _raw_spin_unlock+0x26/0x40 [ 1258.720758][ T8994] ? __mutex_lock+0x21c/0x8d0 [ 1258.725449][ T8994] ? rtnl_setlink+0x300/0x300 [ 1258.730168][ T8994] rtnetlink_rcv_msg+0x807/0x8c0 [ 1258.735108][ T8994] ? memcg_list_lru_alloc+0xd5/0x750 [ 1258.740405][ T8994] ? mod_objcg_state+0x357/0x580 [ 1258.745364][ T8994] ? slab_post_alloc_hook+0x82/0x2f0 [ 1258.750663][ T8994] ? kmem_cache_free+0x1d9/0x380 [ 1258.755621][ T8994] ? __kfree_skb+0x104/0x140 [ 1258.760214][ T8994] ? nlmon_xmit+0x4b/0x60 [ 1258.764563][ T8994] ? __kfree_skb+0x104/0x140 [ 1258.769148][ T8994] ? consume_skb+0x57/0x180 [ 1258.773648][ T8994] ? nlmon_xmit+0x4b/0x60 [ 1258.778059][ T8994] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1258.783467][ T8994] ? __dev_queue_xmit+0xaae/0x1d80 [ 1258.788658][ T8994] ? ref_tracker_free+0x3a1/0x400 [ 1258.793692][ T8994] netlink_rcv_skb+0x126/0x220 [ 1258.798460][ T8994] ? rtnetlink_bind+0x60/0x60 [ 1258.803204][ T8994] rtnetlink_rcv+0x1c/0x20 [ 1258.807649][ T8994] netlink_unicast+0x589/0x650 [ 1258.812469][ T8994] netlink_sendmsg+0x66e/0x770 [ 1258.817240][ T8994] ? netlink_getsockopt+0x3e0/0x3e0 [ 1258.822449][ T8994] ____sys_sendmsg+0x37c/0x4d0 [ 1258.827217][ T8994] __sys_sendmsg+0x1e9/0x270 [ 1258.831840][ T8994] __x64_sys_sendmsg+0x46/0x50 [ 1258.836610][ T8994] do_syscall_64+0x44/0x110 [ 1258.841193][ T8994] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1258.847096][ T8994] RIP: 0033:0x7efd2e8d0ce9 [ 1258.851511][ T8994] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1258.871130][ T8994] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1258.879543][ T8994] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1258.887520][ T8994] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1258.895496][ T8994] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1258.903490][ T8994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1258.911467][ T8994] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1258.919445][ T8994] 03:19:44 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef020600000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:44 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef03a800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1259.027231][ T9000] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1259.075822][ T9000] wireguard15: entered promiscuous mode [ 1259.081411][ T9000] wireguard15: entered allmulticast mode 03:19:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 44) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1259.183716][ T9002] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1259.197827][ T9002] wireguard12: entered promiscuous mode [ 1259.203556][ T9002] wireguard12: entered allmulticast mode 03:19:44 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0395484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:44 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000700000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1259.352304][ T9010] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1259.361562][ T9010] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1259.371632][ T9010] FAULT_INJECTION: forcing a failure. [ 1259.371632][ T9010] name failslab, interval 1, probability 0, space 0, times 0 [ 1259.384256][ T9010] CPU: 0 PID: 9010 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1259.394621][ T9010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1259.404732][ T9010] Call Trace: [ 1259.408005][ T9010] [ 1259.410934][ T9010] dump_stack_lvl+0xda/0x130 [ 1259.415572][ T9010] dump_stack+0x15/0x20 [ 1259.419800][ T9010] should_fail_ex+0x21f/0x230 [ 1259.424573][ T9010] ? __kernfs_new_node+0x6a/0x380 [ 1259.429717][ T9010] __should_failslab+0x92/0xa0 [ 1259.434535][ T9010] should_failslab+0x9/0x20 [ 1259.439189][ T9010] kmem_cache_alloc+0x4e/0x250 [ 1259.443966][ T9010] __kernfs_new_node+0x6a/0x380 [ 1259.448831][ T9010] ? rb_insert_color+0x280/0x290 [ 1259.453777][ T9010] ? up_write+0x30/0xe0 [ 1259.457935][ T9010] ? kernfs_activate+0x252/0x270 [ 1259.462949][ T9010] kernfs_new_node+0x5f/0xd0 [ 1259.467551][ T9010] __kernfs_create_file+0x49/0x180 [ 1259.472677][ T9010] ? dev_attr_show+0x90/0x90 [ 1259.477347][ T9010] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1259.482751][ T9010] internal_create_group+0x2e4/0x800 [ 1259.488060][ T9010] sysfs_create_groups+0x3c/0xe0 [ 1259.493001][ T9010] device_add_attrs+0x69/0x400 [ 1259.497814][ T9010] ? kobject_put+0xd8/0x160 [ 1259.502362][ T9010] device_add+0x431/0x8b0 [ 1259.506724][ T9010] netdev_register_kobject+0xfc/0x230 [ 1259.512114][ T9010] register_netdevice+0x86f/0xd60 [ 1259.517158][ T9010] ? mutex_lock+0xd/0x30 [ 1259.521415][ T9010] wg_newlink+0x3b2/0x580 [ 1259.525761][ T9010] ? wg_setup+0x1d0/0x1d0 [ 1259.530149][ T9010] rtnl_newlink+0xee5/0x1670 [ 1259.534804][ T9010] ? security_capable+0x5e/0x80 [ 1259.539673][ T9010] ? ns_capable+0x7c/0xb0 [ 1259.544045][ T9010] ? rtnl_setlink+0x300/0x300 [ 1259.548751][ T9010] rtnetlink_rcv_msg+0x807/0x8c0 [ 1259.553856][ T9010] ? memcg_list_lru_alloc+0xd5/0x750 [ 1259.559223][ T9010] ? mod_objcg_state+0x357/0x580 [ 1259.564165][ T9010] ? slab_post_alloc_hook+0x82/0x2f0 [ 1259.569488][ T9010] ? kmem_cache_free+0x1d9/0x380 [ 1259.574494][ T9010] ? __kfree_skb+0x104/0x140 [ 1259.579132][ T9010] ? nlmon_xmit+0x4b/0x60 [ 1259.583463][ T9010] ? __kfree_skb+0x104/0x140 [ 1259.588053][ T9010] ? consume_skb+0x57/0x180 [ 1259.592641][ T9010] ? nlmon_xmit+0x4b/0x60 [ 1259.597012][ T9010] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1259.602312][ T9010] ? __dev_queue_xmit+0xaae/0x1d80 [ 1259.607456][ T9010] ? ref_tracker_free+0x3a1/0x400 [ 1259.612515][ T9010] netlink_rcv_skb+0x126/0x220 [ 1259.617344][ T9010] ? rtnetlink_bind+0x60/0x60 [ 1259.622097][ T9010] rtnetlink_rcv+0x1c/0x20 [ 1259.626518][ T9010] netlink_unicast+0x589/0x650 [ 1259.631358][ T9010] netlink_sendmsg+0x66e/0x770 [ 1259.636189][ T9010] ? netlink_getsockopt+0x3e0/0x3e0 [ 1259.641383][ T9010] ____sys_sendmsg+0x37c/0x4d0 [ 1259.646160][ T9010] __sys_sendmsg+0x1e9/0x270 [ 1259.650775][ T9010] __x64_sys_sendmsg+0x46/0x50 [ 1259.655536][ T9010] do_syscall_64+0x44/0x110 [ 1259.660103][ T9010] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1259.666058][ T9010] RIP: 0033:0x7efd2e8d0ce9 [ 1259.670479][ T9010] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1259.690101][ T9010] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1259.698528][ T9010] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1259.706527][ T9010] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1259.714503][ T9010] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1259.722532][ T9010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1259.730516][ T9010] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1259.738504][ T9010] [ 1259.752981][ T9015] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1259.845457][ T9015] wireguard15: entered promiscuous mode [ 1259.851041][ T9015] wireguard15: entered allmulticast mode 03:19:45 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xef02, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:45 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef02ae00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1260.591462][ T9027] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1260.616372][ T9027] wireguard12: entered promiscuous mode [ 1260.622032][ T9027] wireguard12: entered allmulticast mode 03:19:45 executing program 4: preadv2(0xffffffffffffffff, &(0x7f00000016c0)=[{&(0x7f0000000000)=""/179, 0xb3}, {&(0x7f00000000c0)=""/235, 0xeb}, {&(0x7f00000001c0)=""/92, 0x5c}, {&(0x7f0000000240)=""/212, 0xd4}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/239, 0xef}, {&(0x7f0000000480)=""/182, 0xb6}, {&(0x7f0000000540)=""/190, 0xbe}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/152, 0x98}], 0xa, 0x2, 0x9, 0x10) shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) (async) mlockall(0x1) 03:19:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 45) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:45 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000900000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:45 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0495484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:45 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef02b200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1260.813964][ T9032] wireguard15: entered promiscuous mode [ 1260.819563][ T9032] wireguard15: entered allmulticast mode [ 1260.858715][ T9044] wireguard12: entered promiscuous mode [ 1260.864338][ T9044] wireguard12: entered allmulticast mode [ 1260.895626][ T9046] FAULT_INJECTION: forcing a failure. [ 1260.895626][ T9046] name failslab, interval 1, probability 0, space 0, times 0 [ 1260.908300][ T9046] CPU: 0 PID: 9046 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1260.918679][ T9046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1260.928736][ T9046] Call Trace: [ 1260.932016][ T9046] [ 1260.935027][ T9046] dump_stack_lvl+0xda/0x130 [ 1260.939663][ T9046] dump_stack+0x15/0x20 [ 1260.943869][ T9046] should_fail_ex+0x21f/0x230 [ 1260.948716][ T9046] ? __kernfs_new_node+0x6a/0x380 [ 1260.953904][ T9046] __should_failslab+0x92/0xa0 [ 1260.958754][ T9046] should_failslab+0x9/0x20 [ 1260.963291][ T9046] kmem_cache_alloc+0x4e/0x250 [ 1260.968134][ T9046] __kernfs_new_node+0x6a/0x380 [ 1260.972990][ T9046] ? rb_insert_color+0x280/0x290 [ 1260.977959][ T9046] ? up_write+0x30/0xe0 [ 1260.982124][ T9046] ? kernfs_activate+0x252/0x270 [ 1260.987128][ T9046] kernfs_new_node+0x5f/0xd0 [ 1260.991806][ T9046] __kernfs_create_file+0x49/0x180 [ 1260.996983][ T9046] ? dev_attr_show+0x90/0x90 [ 1261.001585][ T9046] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1261.006966][ T9046] internal_create_group+0x2e4/0x800 [ 1261.012308][ T9046] sysfs_create_groups+0x3c/0xe0 [ 1261.017330][ T9046] device_add_attrs+0x69/0x400 [ 1261.022130][ T9046] ? kobject_put+0xd8/0x160 [ 1261.026647][ T9046] device_add+0x431/0x8b0 [ 1261.030990][ T9046] netdev_register_kobject+0xfc/0x230 [ 1261.036416][ T9046] register_netdevice+0x86f/0xd60 [ 1261.041454][ T9046] ? mutex_lock+0xd/0x30 [ 1261.045765][ T9046] wg_newlink+0x3b2/0x580 [ 1261.050144][ T9046] ? wg_setup+0x1d0/0x1d0 [ 1261.054481][ T9046] rtnl_newlink+0xee5/0x1670 [ 1261.059167][ T9046] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1261.065479][ T9046] ? _raw_spin_unlock+0x26/0x40 [ 1261.070387][ T9046] ? __mutex_lock+0x21c/0x8d0 [ 1261.075132][ T9046] ? rtnl_setlink+0x300/0x300 [ 1261.079826][ T9046] rtnetlink_rcv_msg+0x807/0x8c0 [ 1261.084800][ T9046] ? memcg_list_lru_alloc+0xd5/0x750 [ 1261.090104][ T9046] ? mod_objcg_state+0x357/0x580 [ 1261.095035][ T9046] ? slab_post_alloc_hook+0x82/0x2f0 [ 1261.100391][ T9046] ? kmem_cache_free+0x1d9/0x380 [ 1261.105401][ T9046] ? __kfree_skb+0x104/0x140 [ 1261.110038][ T9046] ? nlmon_xmit+0x4b/0x60 [ 1261.114390][ T9046] ? __kfree_skb+0x104/0x140 [ 1261.118970][ T9046] ? consume_skb+0x57/0x180 [ 1261.123539][ T9046] ? nlmon_xmit+0x4b/0x60 [ 1261.127921][ T9046] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1261.133205][ T9046] ? __dev_queue_xmit+0xaae/0x1d80 [ 1261.138393][ T9046] ? ref_tracker_free+0x3a1/0x400 [ 1261.143421][ T9046] netlink_rcv_skb+0x126/0x220 [ 1261.148229][ T9046] ? rtnetlink_bind+0x60/0x60 [ 1261.152901][ T9046] rtnetlink_rcv+0x1c/0x20 [ 1261.157335][ T9046] netlink_unicast+0x589/0x650 [ 1261.162102][ T9046] netlink_sendmsg+0x66e/0x770 [ 1261.166872][ T9046] ? netlink_getsockopt+0x3e0/0x3e0 [ 1261.172130][ T9046] ____sys_sendmsg+0x37c/0x4d0 [ 1261.176896][ T9046] __sys_sendmsg+0x1e9/0x270 [ 1261.181824][ T9046] __x64_sys_sendmsg+0x46/0x50 [ 1261.186673][ T9046] do_syscall_64+0x44/0x110 [ 1261.191190][ T9046] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1261.197078][ T9046] RIP: 0033:0x7efd2e8d0ce9 [ 1261.201482][ T9046] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1261.221093][ T9046] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1261.229591][ T9046] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1261.237550][ T9046] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1261.245511][ T9046] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 03:19:46 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0595484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1261.253575][ T9046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1261.261549][ T9046] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1261.269546][ T9046] 03:19:46 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000a00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:46 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef02b800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1261.465407][ T9058] wireguard15: entered promiscuous mode [ 1261.471003][ T9058] wireguard15: entered allmulticast mode [ 1261.543774][ T9062] wireguard12: entered promiscuous mode [ 1261.549369][ T9062] wireguard12: entered allmulticast mode 03:19:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 46) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:46 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefda0a00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1261.676856][ T9067] wireguard15: entered promiscuous mode [ 1261.682458][ T9067] wireguard15: entered allmulticast mode [ 1261.826428][ T9069] FAULT_INJECTION: forcing a failure. [ 1261.826428][ T9069] name failslab, interval 1, probability 0, space 0, times 0 [ 1261.839131][ T9069] CPU: 1 PID: 9069 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1261.849526][ T9069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1261.859580][ T9069] Call Trace: [ 1261.862896][ T9069] [ 1261.865911][ T9069] dump_stack_lvl+0xda/0x130 [ 1261.870597][ T9069] dump_stack+0x15/0x20 [ 1261.874848][ T9069] should_fail_ex+0x21f/0x230 [ 1261.879537][ T9069] ? __kernfs_new_node+0x6a/0x380 [ 1261.884631][ T9069] __should_failslab+0x92/0xa0 [ 1261.889407][ T9069] should_failslab+0x9/0x20 [ 1261.893923][ T9069] kmem_cache_alloc+0x4e/0x250 [ 1261.898782][ T9069] __kernfs_new_node+0x6a/0x380 [ 1261.903643][ T9069] ? rb_insert_color+0x263/0x290 [ 1261.908583][ T9069] ? up_write+0x30/0xe0 [ 1261.912744][ T9069] ? kernfs_activate+0x252/0x270 [ 1261.917708][ T9069] kernfs_new_node+0x5f/0xd0 [ 1261.922308][ T9069] __kernfs_create_file+0x49/0x180 [ 1261.927691][ T9069] ? dev_attr_show+0x90/0x90 [ 1261.932281][ T9069] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1261.937766][ T9069] internal_create_group+0x2e4/0x800 [ 1261.943133][ T9069] sysfs_create_groups+0x3c/0xe0 [ 1261.948161][ T9069] device_add_attrs+0x69/0x400 [ 1261.953027][ T9069] ? kobject_put+0xd8/0x160 [ 1261.957534][ T9069] device_add+0x431/0x8b0 [ 1261.961881][ T9069] netdev_register_kobject+0xfc/0x230 [ 1261.967281][ T9069] register_netdevice+0x86f/0xd60 [ 1261.972393][ T9069] ? mutex_lock+0xd/0x30 [ 1261.976714][ T9069] wg_newlink+0x3b2/0x580 [ 1261.981053][ T9069] ? wg_setup+0x1d0/0x1d0 [ 1261.985420][ T9069] rtnl_newlink+0xee5/0x1670 [ 1261.990046][ T9069] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1261.996299][ T9069] ? _raw_spin_unlock+0x26/0x40 [ 1262.001204][ T9069] ? __mutex_lock+0x21c/0x8d0 [ 1262.005886][ T9069] ? rtnl_setlink+0x300/0x300 [ 1262.010616][ T9069] rtnetlink_rcv_msg+0x807/0x8c0 [ 1262.015570][ T9069] ? memcg_list_lru_alloc+0xd5/0x750 [ 1262.020869][ T9069] ? mod_objcg_state+0x357/0x580 [ 1262.025810][ T9069] ? slab_post_alloc_hook+0x82/0x2f0 [ 1262.031102][ T9069] ? kmem_cache_free+0x1d9/0x380 [ 1262.036054][ T9069] ? __kfree_skb+0x104/0x140 [ 1262.040644][ T9069] ? nlmon_xmit+0x4b/0x60 [ 1262.044986][ T9069] ? __kfree_skb+0x104/0x140 [ 1262.049577][ T9069] ? consume_skb+0x57/0x180 [ 1262.054082][ T9069] ? nlmon_xmit+0x4b/0x60 [ 1262.058424][ T9069] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1262.063725][ T9069] ? __dev_queue_xmit+0xaae/0x1d80 [ 1262.068907][ T9069] ? ref_tracker_free+0x3a1/0x400 [ 1262.074021][ T9069] netlink_rcv_skb+0x126/0x220 [ 1262.078802][ T9069] ? rtnetlink_bind+0x60/0x60 [ 1262.083551][ T9069] rtnetlink_rcv+0x1c/0x20 [ 1262.088012][ T9069] netlink_unicast+0x589/0x650 [ 1262.092838][ T9069] netlink_sendmsg+0x66e/0x770 [ 1262.097602][ T9069] ? netlink_getsockopt+0x3e0/0x3e0 [ 1262.102810][ T9069] ____sys_sendmsg+0x37c/0x4d0 [ 1262.107622][ T9069] __sys_sendmsg+0x1e9/0x270 [ 1262.112229][ T9069] __x64_sys_sendmsg+0x46/0x50 [ 1262.117061][ T9069] do_syscall_64+0x44/0x110 [ 1262.121617][ T9069] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1262.127524][ T9069] RIP: 0033:0x7efd2e8d0ce9 [ 1262.132022][ T9069] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1262.151691][ T9069] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1262.160110][ T9069] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1262.168499][ T9069] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 03:19:47 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef03bc00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:47 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffc000/0x3000)=nil) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:19:47 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0695484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:47 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xfc00, 0x0, 0x0, 0x0) mlockall(0x0) [ 1262.176475][ T9069] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1262.184451][ T9069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1262.192430][ T9069] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1262.200504][ T9069] 03:19:47 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000b00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1262.284196][ T9078] wireguard12: entered promiscuous mode [ 1262.289794][ T9078] wireguard12: entered allmulticast mode [ 1262.345889][ T9085] wireguard15: entered promiscuous mode [ 1262.351474][ T9085] wireguard15: entered allmulticast mode 03:19:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 47) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:47 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef03c400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:47 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef010b00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1262.527827][ T9094] wireguard12: entered promiscuous mode [ 1262.533414][ T9094] wireguard12: entered allmulticast mode [ 1262.594999][ T9098] FAULT_INJECTION: forcing a failure. [ 1262.594999][ T9098] name failslab, interval 1, probability 0, space 0, times 0 [ 1262.607765][ T9098] CPU: 1 PID: 9098 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1262.618197][ T9098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1262.628274][ T9098] Call Trace: [ 1262.631563][ T9098] [ 1262.634490][ T9098] dump_stack_lvl+0xda/0x130 [ 1262.639094][ T9098] dump_stack+0x15/0x20 [ 1262.643398][ T9098] should_fail_ex+0x21f/0x230 [ 1262.648088][ T9098] ? __kernfs_new_node+0x6a/0x380 [ 1262.653159][ T9098] __should_failslab+0x92/0xa0 [ 1262.658017][ T9098] should_failslab+0x9/0x20 [ 1262.662575][ T9098] kmem_cache_alloc+0x4e/0x250 [ 1262.667367][ T9098] __kernfs_new_node+0x6a/0x380 [ 1262.672226][ T9098] ? rb_insert_color+0x6a/0x290 [ 1262.677161][ T9098] ? up_write+0x30/0xe0 [ 1262.681352][ T9098] ? kernfs_activate+0x252/0x270 [ 1262.686291][ T9098] kernfs_new_node+0x5f/0xd0 [ 1262.690928][ T9098] __kernfs_create_file+0x49/0x180 [ 1262.696055][ T9098] ? dev_attr_show+0x90/0x90 [ 1262.700667][ T9098] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1262.706205][ T9098] internal_create_group+0x2e4/0x800 [ 1262.711510][ T9098] sysfs_create_groups+0x3c/0xe0 [ 1262.716492][ T9098] device_add_attrs+0x69/0x400 [ 1262.721263][ T9098] ? kobject_put+0xd8/0x160 [ 1262.725779][ T9098] device_add+0x431/0x8b0 [ 1262.730128][ T9098] netdev_register_kobject+0xfc/0x230 [ 1262.735512][ T9098] register_netdevice+0x86f/0xd60 [ 1262.740577][ T9098] ? mutex_lock+0xd/0x30 [ 1262.744856][ T9098] wg_newlink+0x3b2/0x580 [ 1262.749240][ T9098] ? wg_setup+0x1d0/0x1d0 [ 1262.753583][ T9098] rtnl_newlink+0xee5/0x1670 [ 1262.758301][ T9098] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1262.764552][ T9098] ? _raw_spin_unlock+0x26/0x40 [ 1262.769410][ T9098] ? __mutex_lock+0x21c/0x8d0 [ 1262.774123][ T9098] ? rtnl_setlink+0x300/0x300 [ 1262.778818][ T9098] rtnetlink_rcv_msg+0x807/0x8c0 [ 1262.783801][ T9098] ? __rcu_read_unlock+0x4d/0x70 [ 1262.788831][ T9098] ? __rcu_read_unlock+0x4d/0x70 [ 1262.793826][ T9098] ? __refill_stock+0x7f/0xb0 [ 1262.798633][ T9098] ? kmem_cache_free+0x1d9/0x380 [ 1262.803590][ T9098] ? __kfree_skb+0x104/0x140 [ 1262.808521][ T9098] ? nlmon_xmit+0x4b/0x60 [ 1262.812869][ T9098] ? __kfree_skb+0x104/0x140 [ 1262.817467][ T9098] ? consume_skb+0x57/0x180 [ 1262.822037][ T9098] ? nlmon_xmit+0x4b/0x60 [ 1262.826551][ T9098] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1262.831852][ T9098] ? __dev_queue_xmit+0xaae/0x1d80 [ 1262.836981][ T9098] ? ref_tracker_free+0x3a1/0x400 [ 1262.842042][ T9098] netlink_rcv_skb+0x126/0x220 [ 1262.846875][ T9098] ? rtnetlink_bind+0x60/0x60 [ 1262.851566][ T9098] rtnetlink_rcv+0x1c/0x20 [ 1262.855985][ T9098] netlink_unicast+0x589/0x650 [ 1262.860803][ T9098] netlink_sendmsg+0x66e/0x770 [ 1262.865574][ T9098] ? netlink_getsockopt+0x3e0/0x3e0 [ 1262.870823][ T9098] ____sys_sendmsg+0x37c/0x4d0 [ 1262.875597][ T9098] __sys_sendmsg+0x1e9/0x270 [ 1262.880234][ T9098] __x64_sys_sendmsg+0x46/0x50 [ 1262.885084][ T9098] do_syscall_64+0x44/0x110 [ 1262.889619][ T9098] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1262.895593][ T9098] RIP: 0033:0x7efd2e8d0ce9 [ 1262.900006][ T9098] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1262.919702][ T9098] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1262.928122][ T9098] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1262.936096][ T9098] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1262.944064][ T9098] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1262.952040][ T9098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1262.960004][ T9098] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1262.967974][ T9098] [ 1262.997250][ T9097] wireguard15: entered promiscuous mode [ 1263.002853][ T9097] wireguard15: entered allmulticast mode 03:19:48 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000c00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:48 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00d000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1263.177119][ T9106] wireguard15: entered promiscuous mode [ 1263.182865][ T9106] wireguard15: entered allmulticast mode 03:19:48 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 48) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1263.298779][ T9109] wireguard12: entered promiscuous mode [ 1263.304468][ T9109] wireguard12: entered allmulticast mode [ 1263.415899][ T9115] __nla_validate_parse: 17 callbacks suppressed [ 1263.415911][ T9115] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1263.431408][ T9115] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1263.442338][ T9115] FAULT_INJECTION: forcing a failure. [ 1263.442338][ T9115] name failslab, interval 1, probability 0, space 0, times 0 [ 1263.454997][ T9115] CPU: 0 PID: 9115 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 03:19:48 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async, rerun: 64) mlockall(0x1) (rerun: 64) shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffc000/0x3000)=nil) (async, rerun: 32) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) (rerun: 32) [ 1263.465330][ T9115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1263.475392][ T9115] Call Trace: [ 1263.478680][ T9115] [ 1263.481607][ T9115] dump_stack_lvl+0xda/0x130 [ 1263.486298][ T9115] dump_stack+0x15/0x20 [ 1263.490535][ T9115] should_fail_ex+0x21f/0x230 [ 1263.495299][ T9115] ? __kernfs_new_node+0x6a/0x380 [ 1263.500331][ T9115] __should_failslab+0x92/0xa0 [ 1263.505131][ T9115] should_failslab+0x9/0x20 [ 1263.509695][ T9115] kmem_cache_alloc+0x4e/0x250 [ 1263.514512][ T9115] __kernfs_new_node+0x6a/0x380 [ 1263.519415][ T9115] ? rb_insert_color+0x6a/0x290 [ 1263.524283][ T9115] ? up_write+0x30/0xe0 [ 1263.528438][ T9115] ? kernfs_activate+0x252/0x270 [ 1263.533380][ T9115] kernfs_new_node+0x5f/0xd0 [ 1263.538014][ T9115] __kernfs_create_file+0x49/0x180 [ 1263.543208][ T9115] ? dev_attr_show+0x90/0x90 [ 1263.547814][ T9115] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1263.553291][ T9115] internal_create_group+0x2e4/0x800 [ 1263.558659][ T9115] sysfs_create_groups+0x3c/0xe0 [ 1263.563692][ T9115] device_add_attrs+0x69/0x400 [ 1263.568576][ T9115] ? kobject_put+0xd8/0x160 [ 1263.573095][ T9115] device_add+0x431/0x8b0 [ 1263.577432][ T9115] netdev_register_kobject+0xfc/0x230 [ 1263.582893][ T9115] register_netdevice+0x86f/0xd60 [ 1263.588021][ T9115] ? mutex_lock+0xd/0x30 [ 1263.592276][ T9115] wg_newlink+0x3b2/0x580 [ 1263.596617][ T9115] ? wg_setup+0x1d0/0x1d0 [ 1263.600953][ T9115] rtnl_newlink+0xee5/0x1670 [ 1263.605562][ T9115] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1263.611821][ T9115] ? _raw_spin_unlock+0x26/0x40 [ 1263.616704][ T9115] ? __mutex_lock+0x21c/0x8d0 [ 1263.621423][ T9115] ? rtnl_setlink+0x300/0x300 [ 1263.626108][ T9115] rtnetlink_rcv_msg+0x807/0x8c0 [ 1263.631053][ T9115] ? memcg_account_kmem+0x121/0x140 [ 1263.636260][ T9115] ? __rcu_read_unlock+0x4d/0x70 [ 1263.641199][ T9115] ? mod_objcg_state+0x357/0x580 [ 1263.646143][ T9115] ? slab_post_alloc_hook+0x82/0x2f0 [ 1263.651437][ T9115] ? kmem_cache_free+0x1d9/0x380 [ 1263.656468][ T9115] ? __kfree_skb+0x104/0x140 [ 1263.661067][ T9115] ? nlmon_xmit+0x4b/0x60 [ 1263.665485][ T9115] ? __kfree_skb+0x104/0x140 [ 1263.670170][ T9115] ? consume_skb+0x57/0x180 [ 1263.674713][ T9115] ? nlmon_xmit+0x4b/0x60 [ 1263.679049][ T9115] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1263.684339][ T9115] ? __dev_queue_xmit+0xaae/0x1d80 [ 1263.689529][ T9115] ? ref_tracker_free+0x3a1/0x400 [ 1263.694632][ T9115] netlink_rcv_skb+0x126/0x220 [ 1263.699417][ T9115] ? rtnetlink_bind+0x60/0x60 [ 1263.704103][ T9115] rtnetlink_rcv+0x1c/0x20 [ 1263.708593][ T9115] netlink_unicast+0x589/0x650 [ 1263.713377][ T9115] netlink_sendmsg+0x66e/0x770 [ 1263.718193][ T9115] ? netlink_getsockopt+0x3e0/0x3e0 [ 1263.723390][ T9115] ____sys_sendmsg+0x37c/0x4d0 [ 1263.728162][ T9115] __sys_sendmsg+0x1e9/0x270 [ 1263.732815][ T9115] __x64_sys_sendmsg+0x46/0x50 [ 1263.737589][ T9115] do_syscall_64+0x44/0x110 [ 1263.742190][ T9115] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1263.748087][ T9115] RIP: 0033:0x7efd2e8d0ce9 [ 1263.752561][ T9115] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1263.772180][ T9115] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1263.780666][ T9115] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1263.788647][ T9115] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1263.796681][ T9115] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1263.804672][ T9115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:19:48 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000d00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1263.812706][ T9115] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1263.820686][ T9115] 03:19:49 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef02d400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1263.933793][ T9125] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1263.970499][ T9125] wireguard12: entered promiscuous mode [ 1263.976204][ T9125] wireguard12: entered allmulticast mode [ 1264.079804][ T9123] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1264.130231][ T9123] wireguard15: entered promiscuous mode [ 1264.135893][ T9123] wireguard15: entered allmulticast mode 03:19:49 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0795484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:49 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x20010, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:49 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 49) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:49 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00d800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:49 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000e00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:49 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) (async, rerun: 64) shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffc000/0x3000)=nil) (async, rerun: 64) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 1264.766072][ T9137] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1264.797951][ T9137] wireguard15: entered promiscuous mode [ 1264.803624][ T9137] wireguard15: entered allmulticast mode [ 1264.857681][ T9136] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1264.888636][ T9136] wireguard12: entered promiscuous mode [ 1264.894444][ T9136] wireguard12: entered allmulticast mode [ 1264.926752][ T9141] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1264.936136][ T9141] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1264.947315][ T9141] FAULT_INJECTION: forcing a failure. [ 1264.947315][ T9141] name failslab, interval 1, probability 0, space 0, times 0 [ 1264.960124][ T9141] CPU: 1 PID: 9141 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1264.970447][ T9141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1264.980504][ T9141] Call Trace: [ 1264.983811][ T9141] [ 1264.986734][ T9141] dump_stack_lvl+0xda/0x130 [ 1264.991339][ T9141] dump_stack+0x15/0x20 [ 1264.995521][ T9141] should_fail_ex+0x21f/0x230 [ 1265.000212][ T9141] ? __kernfs_new_node+0x6a/0x380 [ 1265.005236][ T9141] __should_failslab+0x92/0xa0 [ 1265.010024][ T9141] should_failslab+0x9/0x20 [ 1265.014537][ T9141] kmem_cache_alloc+0x4e/0x250 [ 1265.019346][ T9141] __kernfs_new_node+0x6a/0x380 [ 1265.024202][ T9141] ? rb_insert_color+0x6a/0x290 [ 1265.029161][ T9141] ? up_write+0x30/0xe0 [ 1265.033322][ T9141] ? kernfs_activate+0x252/0x270 [ 1265.038339][ T9141] kernfs_new_node+0x5f/0xd0 [ 1265.042981][ T9141] __kernfs_create_file+0x49/0x180 [ 1265.048106][ T9141] ? dev_attr_show+0x90/0x90 [ 1265.052699][ T9141] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1265.058084][ T9141] internal_create_group+0x2e4/0x800 [ 1265.063421][ T9141] sysfs_create_groups+0x3c/0xe0 [ 1265.068448][ T9141] device_add_attrs+0x69/0x400 [ 1265.073225][ T9141] ? kobject_put+0xd8/0x160 [ 1265.077747][ T9141] device_add+0x431/0x8b0 [ 1265.082255][ T9141] netdev_register_kobject+0xfc/0x230 [ 1265.087714][ T9141] register_netdevice+0x86f/0xd60 [ 1265.092915][ T9141] ? mutex_lock+0xd/0x30 [ 1265.097216][ T9141] wg_newlink+0x3b2/0x580 [ 1265.102197][ T9141] ? wg_setup+0x1d0/0x1d0 [ 1265.106538][ T9141] rtnl_newlink+0xee5/0x1670 [ 1265.111235][ T9141] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1265.117562][ T9141] ? _raw_spin_unlock+0x26/0x40 [ 1265.122570][ T9141] ? __mutex_lock+0x21c/0x8d0 [ 1265.127256][ T9141] ? rtnl_setlink+0x300/0x300 [ 1265.131945][ T9141] rtnetlink_rcv_msg+0x807/0x8c0 [ 1265.136902][ T9141] ? memcg_list_lru_alloc+0xd5/0x750 [ 1265.142243][ T9141] ? security_inode_alloc+0x32/0xd0 [ 1265.147572][ T9141] ? slab_post_alloc_hook+0x82/0x2f0 [ 1265.152871][ T9141] ? kmem_cache_free+0x1d9/0x380 [ 1265.157891][ T9141] ? __kfree_skb+0x104/0x140 [ 1265.162488][ T9141] ? nlmon_xmit+0x4b/0x60 [ 1265.166838][ T9141] ? __kfree_skb+0x104/0x140 [ 1265.171605][ T9141] ? consume_skb+0x57/0x180 [ 1265.176165][ T9141] ? nlmon_xmit+0x4b/0x60 [ 1265.180517][ T9141] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1265.185840][ T9141] ? __dev_queue_xmit+0xaae/0x1d80 [ 1265.190958][ T9141] ? ref_tracker_free+0x3a1/0x400 [ 1265.195991][ T9141] netlink_rcv_skb+0x126/0x220 [ 1265.200757][ T9141] ? rtnetlink_bind+0x60/0x60 [ 1265.205448][ T9141] rtnetlink_rcv+0x1c/0x20 [ 1265.209954][ T9141] netlink_unicast+0x589/0x650 [ 1265.214750][ T9141] netlink_sendmsg+0x66e/0x770 [ 1265.219549][ T9141] ? netlink_getsockopt+0x3e0/0x3e0 [ 1265.224755][ T9141] ____sys_sendmsg+0x37c/0x4d0 [ 1265.229610][ T9141] __sys_sendmsg+0x1e9/0x270 [ 1265.234291][ T9141] __x64_sys_sendmsg+0x46/0x50 [ 1265.239070][ T9141] do_syscall_64+0x44/0x110 [ 1265.243606][ T9141] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1265.249635][ T9141] RIP: 0033:0x7efd2e8d0ce9 [ 1265.254053][ T9141] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1265.273746][ T9141] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1265.282165][ T9141] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1265.290143][ T9141] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1265.298118][ T9141] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1265.306090][ T9141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1265.314115][ T9141] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1265.322166][ T9141] 03:19:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0ada00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:50 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) 03:19:50 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000f00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:50 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0895484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 50) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1265.550246][ T9162] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1265.577354][ T9162] wireguard15: entered promiscuous mode [ 1265.582942][ T9162] wireguard15: entered allmulticast mode [ 1265.627168][ T9163] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1265.700798][ T9163] wireguard12: entered promiscuous mode [ 1265.706581][ T9163] wireguard12: entered allmulticast mode [ 1265.784166][ T9172] FAULT_INJECTION: forcing a failure. [ 1265.784166][ T9172] name failslab, interval 1, probability 0, space 0, times 0 [ 1265.796855][ T9172] CPU: 0 PID: 9172 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1265.807190][ T9172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1265.817289][ T9172] Call Trace: [ 1265.820566][ T9172] [ 1265.823513][ T9172] dump_stack_lvl+0xda/0x130 [ 1265.828129][ T9172] dump_stack+0x15/0x20 [ 1265.832436][ T9172] should_fail_ex+0x21f/0x230 [ 1265.837162][ T9172] ? __kernfs_new_node+0x6a/0x380 [ 1265.842219][ T9172] __should_failslab+0x92/0xa0 [ 1265.847001][ T9172] should_failslab+0x9/0x20 [ 1265.851514][ T9172] kmem_cache_alloc+0x4e/0x250 [ 1265.856296][ T9172] __kernfs_new_node+0x6a/0x380 [ 1265.861149][ T9172] ? rb_insert_color+0x263/0x290 [ 1265.866137][ T9172] ? up_write+0x30/0xe0 [ 1265.870298][ T9172] ? kernfs_activate+0x252/0x270 [ 1265.875328][ T9172] kernfs_new_node+0x5f/0xd0 [ 1265.879930][ T9172] __kernfs_create_file+0x49/0x180 [ 1265.885056][ T9172] ? dev_attr_show+0x90/0x90 [ 1265.889649][ T9172] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1265.895034][ T9172] internal_create_group+0x2e4/0x800 [ 1265.900361][ T9172] sysfs_create_groups+0x3c/0xe0 [ 1265.905310][ T9172] device_add_attrs+0x69/0x400 [ 1265.910162][ T9172] ? kobject_put+0xd8/0x160 [ 1265.914817][ T9172] device_add+0x431/0x8b0 [ 1265.919191][ T9172] netdev_register_kobject+0xfc/0x230 [ 1265.924583][ T9172] register_netdevice+0x86f/0xd60 [ 1265.929622][ T9172] ? mutex_lock+0xd/0x30 [ 1265.933991][ T9172] wg_newlink+0x3b2/0x580 [ 1265.938331][ T9172] ? wg_setup+0x1d0/0x1d0 [ 1265.942661][ T9172] rtnl_newlink+0xee5/0x1670 [ 1265.947353][ T9172] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1265.953613][ T9172] ? _raw_spin_unlock+0x26/0x40 [ 1265.958465][ T9172] ? __mutex_lock+0x21c/0x8d0 [ 1265.963181][ T9172] ? rtnl_setlink+0x300/0x300 [ 1265.967877][ T9172] rtnetlink_rcv_msg+0x807/0x8c0 [ 1265.972870][ T9172] ? memcg_list_lru_alloc+0xd5/0x750 [ 1265.978213][ T9172] ? mod_objcg_state+0x357/0x580 [ 1265.983157][ T9172] ? slab_post_alloc_hook+0x82/0x2f0 [ 1265.988462][ T9172] ? kmem_cache_free+0x1d9/0x380 [ 1265.993511][ T9172] ? __kfree_skb+0x104/0x140 [ 1265.998099][ T9172] ? nlmon_xmit+0x4b/0x60 [ 1266.002432][ T9172] ? __kfree_skb+0x104/0x140 [ 1266.007025][ T9172] ? consume_skb+0x57/0x180 [ 1266.011546][ T9172] ? nlmon_xmit+0x4b/0x60 [ 1266.015886][ T9172] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1266.021183][ T9172] ? __dev_queue_xmit+0xaae/0x1d80 [ 1266.026395][ T9172] ? ref_tracker_free+0x3a1/0x400 [ 1266.031431][ T9172] netlink_rcv_skb+0x126/0x220 [ 1266.036204][ T9172] ? rtnetlink_bind+0x60/0x60 [ 1266.040903][ T9172] rtnetlink_rcv+0x1c/0x20 [ 1266.045326][ T9172] netlink_unicast+0x589/0x650 [ 1266.050100][ T9172] netlink_sendmsg+0x66e/0x770 [ 1266.054874][ T9172] ? netlink_getsockopt+0x3e0/0x3e0 [ 1266.060136][ T9172] ____sys_sendmsg+0x37c/0x4d0 [ 1266.064981][ T9172] __sys_sendmsg+0x1e9/0x270 [ 1266.069585][ T9172] __x64_sys_sendmsg+0x46/0x50 [ 1266.074364][ T9172] do_syscall_64+0x44/0x110 [ 1266.078915][ T9172] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1266.084809][ T9172] RIP: 0033:0x7efd2e8d0ce9 [ 1266.089215][ T9172] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1266.108951][ T9172] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1266.117412][ T9172] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1266.125433][ T9172] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1266.133460][ T9172] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1266.141442][ T9172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1266.149511][ T9172] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1266.157557][ T9172] 03:19:51 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef970f00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:51 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef47ee00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1266.306163][ T9179] wireguard15: entered promiscuous mode [ 1266.311745][ T9179] wireguard15: entered allmulticast mode [ 1266.395254][ T9183] wireguard12: entered promiscuous mode [ 1266.400895][ T9183] wireguard12: entered allmulticast mode 03:19:52 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 51) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:52 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0995484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:52 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef001100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:52 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00fc00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:52 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x20200, 0x0, 0x0, 0x0) mlockall(0x0) [ 1267.653751][ T9190] wireguard15: entered promiscuous mode [ 1267.659393][ T9190] wireguard15: entered allmulticast mode [ 1267.731244][ T9187] wireguard12: entered promiscuous mode [ 1267.736950][ T9187] wireguard12: entered allmulticast mode [ 1267.824186][ T9194] FAULT_INJECTION: forcing a failure. [ 1267.824186][ T9194] name failslab, interval 1, probability 0, space 0, times 0 [ 1267.836841][ T9194] CPU: 0 PID: 9194 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1267.847205][ T9194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1267.857271][ T9194] Call Trace: [ 1267.860554][ T9194] [ 1267.863487][ T9194] dump_stack_lvl+0xda/0x130 [ 1267.868102][ T9194] dump_stack+0x15/0x20 [ 1267.872271][ T9194] should_fail_ex+0x21f/0x230 [ 1267.876963][ T9194] ? __kernfs_new_node+0x6a/0x380 [ 1267.882060][ T9194] __should_failslab+0x92/0xa0 [ 1267.886841][ T9194] should_failslab+0x9/0x20 [ 1267.891382][ T9194] kmem_cache_alloc+0x4e/0x250 [ 1267.896190][ T9194] __kernfs_new_node+0x6a/0x380 [ 1267.901099][ T9194] ? rb_insert_color+0x263/0x290 [ 1267.906040][ T9194] ? up_write+0x30/0xe0 [ 1267.910267][ T9194] ? kernfs_activate+0x252/0x270 [ 1267.915220][ T9194] kernfs_new_node+0x5f/0xd0 [ 1267.919890][ T9194] __kernfs_create_file+0x49/0x180 [ 1267.925060][ T9194] ? dev_attr_show+0x90/0x90 [ 1267.929734][ T9194] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1267.935120][ T9194] internal_create_group+0x2e4/0x800 [ 1267.940474][ T9194] sysfs_create_groups+0x3c/0xe0 [ 1267.945446][ T9194] device_add_attrs+0x69/0x400 [ 1267.950290][ T9194] ? kobject_put+0xd8/0x160 [ 1267.954800][ T9194] device_add+0x431/0x8b0 [ 1267.959188][ T9194] netdev_register_kobject+0xfc/0x230 [ 1267.964722][ T9194] register_netdevice+0x86f/0xd60 [ 1267.969762][ T9194] ? mutex_lock+0xd/0x30 [ 1267.974023][ T9194] wg_newlink+0x3b2/0x580 [ 1267.978364][ T9194] ? wg_setup+0x1d0/0x1d0 [ 1267.982784][ T9194] rtnl_newlink+0xee5/0x1670 [ 1267.987393][ T9194] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1267.993642][ T9194] ? _raw_spin_unlock+0x26/0x40 [ 1267.998576][ T9194] ? __mutex_lock+0x21c/0x8d0 [ 1268.003302][ T9194] ? rtnl_setlink+0x300/0x300 [ 1268.008000][ T9194] rtnetlink_rcv_msg+0x807/0x8c0 [ 1268.012965][ T9194] ? memcg_list_lru_alloc+0xd5/0x750 [ 1268.018351][ T9194] ? mod_objcg_state+0x357/0x580 [ 1268.023400][ T9194] ? slab_post_alloc_hook+0x82/0x2f0 [ 1268.028836][ T9194] ? kmem_cache_free+0x1d9/0x380 [ 1268.033795][ T9194] ? __kfree_skb+0x104/0x140 [ 1268.038526][ T9194] ? nlmon_xmit+0x4b/0x60 [ 1268.042866][ T9194] ? __kfree_skb+0x104/0x140 [ 1268.047479][ T9194] ? consume_skb+0x57/0x180 [ 1268.052065][ T9194] ? nlmon_xmit+0x4b/0x60 [ 1268.056400][ T9194] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1268.061781][ T9194] ? __dev_queue_xmit+0xaae/0x1d80 [ 1268.066907][ T9194] ? ref_tracker_free+0x3a1/0x400 [ 1268.071938][ T9194] netlink_rcv_skb+0x126/0x220 [ 1268.076727][ T9194] ? rtnetlink_bind+0x60/0x60 [ 1268.081579][ T9194] rtnetlink_rcv+0x1c/0x20 [ 1268.085991][ T9194] netlink_unicast+0x589/0x650 [ 1268.090891][ T9194] netlink_sendmsg+0x66e/0x770 [ 1268.095689][ T9194] ? netlink_getsockopt+0x3e0/0x3e0 [ 1268.100954][ T9194] ____sys_sendmsg+0x37c/0x4d0 [ 1268.105862][ T9194] __sys_sendmsg+0x1e9/0x270 [ 1268.110468][ T9194] __x64_sys_sendmsg+0x46/0x50 [ 1268.115235][ T9194] do_syscall_64+0x44/0x110 [ 1268.119813][ T9194] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1268.125755][ T9194] RIP: 0033:0x7efd2e8d0ce9 [ 1268.130182][ T9194] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1268.149952][ T9194] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1268.158428][ T9194] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1268.166512][ T9194] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1268.174485][ T9194] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1268.182533][ T9194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1268.190504][ T9194] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1268.198504][ T9194] 03:19:53 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef001200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1268.303906][ T9205] wireguard15: entered promiscuous mode [ 1268.309484][ T9205] wireguard15: entered allmulticast mode 03:19:54 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00ff00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:54 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0a95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:54 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef021500000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 52) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:54 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x80000, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:54 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) [ 1268.977489][ T9213] __nla_validate_parse: 9 callbacks suppressed [ 1268.977512][ T9213] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1269.007382][ T9213] wireguard12: entered promiscuous mode [ 1269.012948][ T9213] wireguard12: entered allmulticast mode [ 1269.059755][ T9220] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1269.078928][ T9220] wireguard15: entered promiscuous mode [ 1269.084620][ T9220] wireguard15: entered allmulticast mode [ 1269.171586][ T9228] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1269.181145][ T9228] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1269.192236][ T9228] FAULT_INJECTION: forcing a failure. [ 1269.192236][ T9228] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.204889][ T9228] CPU: 1 PID: 9228 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1269.215258][ T9228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1269.225346][ T9228] Call Trace: [ 1269.228620][ T9228] [ 1269.231658][ T9228] dump_stack_lvl+0xda/0x130 [ 1269.236309][ T9228] dump_stack+0x15/0x20 [ 1269.240489][ T9228] should_fail_ex+0x21f/0x230 [ 1269.245216][ T9228] ? __kernfs_new_node+0x6a/0x380 [ 1269.250257][ T9228] __should_failslab+0x92/0xa0 [ 1269.255195][ T9228] should_failslab+0x9/0x20 [ 1269.259701][ T9228] kmem_cache_alloc+0x4e/0x250 [ 1269.264498][ T9228] __kernfs_new_node+0x6a/0x380 [ 1269.269350][ T9228] ? rb_insert_color+0x263/0x290 [ 1269.274344][ T9228] ? up_write+0x30/0xe0 [ 1269.278501][ T9228] ? kernfs_activate+0x252/0x270 [ 1269.283461][ T9228] kernfs_new_node+0x5f/0xd0 [ 1269.288058][ T9228] __kernfs_create_file+0x49/0x180 [ 1269.293208][ T9228] ? dev_attr_show+0x90/0x90 [ 1269.297838][ T9228] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1269.303312][ T9228] internal_create_group+0x2e4/0x800 [ 1269.308609][ T9228] sysfs_create_groups+0x3c/0xe0 [ 1269.313582][ T9228] device_add_attrs+0x69/0x400 [ 1269.318370][ T9228] ? kobject_put+0xd8/0x160 [ 1269.322999][ T9228] device_add+0x431/0x8b0 [ 1269.327378][ T9228] netdev_register_kobject+0xfc/0x230 [ 1269.332818][ T9228] register_netdevice+0x86f/0xd60 [ 1269.337875][ T9228] ? mutex_lock+0xd/0x30 [ 1269.342203][ T9228] wg_newlink+0x3b2/0x580 [ 1269.346552][ T9228] ? wg_setup+0x1d0/0x1d0 [ 1269.351033][ T9228] rtnl_newlink+0xee5/0x1670 [ 1269.355683][ T9228] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1269.361939][ T9228] ? _raw_spin_unlock+0x26/0x40 [ 1269.366867][ T9228] ? __mutex_lock+0x21c/0x8d0 [ 1269.371635][ T9228] ? rtnl_setlink+0x300/0x300 [ 1269.376428][ T9228] rtnetlink_rcv_msg+0x807/0x8c0 [ 1269.381372][ T9228] ? memcg_list_lru_alloc+0xd5/0x750 [ 1269.386670][ T9228] ? mod_objcg_state+0x357/0x580 [ 1269.391611][ T9228] ? slab_post_alloc_hook+0x82/0x2f0 [ 1269.396903][ T9228] ? kmem_cache_free+0x1d9/0x380 [ 1269.401944][ T9228] ? __kfree_skb+0x104/0x140 [ 1269.406595][ T9228] ? nlmon_xmit+0x4b/0x60 [ 1269.410970][ T9228] ? __kfree_skb+0x104/0x140 [ 1269.415608][ T9228] ? consume_skb+0x57/0x180 [ 1269.420169][ T9228] ? nlmon_xmit+0x4b/0x60 [ 1269.424506][ T9228] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1269.429876][ T9228] ? __dev_queue_xmit+0xaae/0x1d80 [ 1269.435058][ T9228] ? ref_tracker_free+0x3a1/0x400 [ 1269.440081][ T9228] netlink_rcv_skb+0x126/0x220 [ 1269.444848][ T9228] ? rtnetlink_bind+0x60/0x60 [ 1269.449584][ T9228] rtnetlink_rcv+0x1c/0x20 [ 1269.454075][ T9228] netlink_unicast+0x589/0x650 [ 1269.458973][ T9228] netlink_sendmsg+0x66e/0x770 [ 1269.463809][ T9228] ? netlink_getsockopt+0x3e0/0x3e0 [ 1269.469006][ T9228] ____sys_sendmsg+0x37c/0x4d0 [ 1269.473854][ T9228] __sys_sendmsg+0x1e9/0x270 [ 1269.478528][ T9228] __x64_sys_sendmsg+0x46/0x50 [ 1269.483349][ T9228] do_syscall_64+0x44/0x110 [ 1269.487916][ T9228] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1269.493811][ T9228] RIP: 0033:0x7efd2e8d0ce9 [ 1269.498298][ T9228] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1269.517917][ T9228] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1269.526336][ T9228] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1269.534366][ T9228] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1269.542410][ T9228] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1269.550459][ T9228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1269.558470][ T9228] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1269.566519][ T9228] 03:19:54 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0fff00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:54 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0b95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:19:54 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef001a00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1269.688503][ T9233] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1269.712834][ T9233] wireguard12: entered promiscuous mode [ 1269.718442][ T9233] wireguard12: entered allmulticast mode 03:19:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 53) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1269.765701][ T9238] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1269.803389][ T9238] wireguard15: entered promiscuous mode [ 1269.809079][ T9238] wireguard15: entered allmulticast mode 03:19:55 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef7fff00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1269.945272][ T9247] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1269.954587][ T9247] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1269.964960][ T9247] FAULT_INJECTION: forcing a failure. [ 1269.964960][ T9247] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.977699][ T9247] CPU: 1 PID: 9247 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1269.988086][ T9247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1269.998203][ T9247] Call Trace: [ 1270.001483][ T9247] [ 1270.004416][ T9247] dump_stack_lvl+0xda/0x130 [ 1270.009023][ T9247] dump_stack+0x15/0x20 [ 1270.013192][ T9247] should_fail_ex+0x21f/0x230 [ 1270.017982][ T9247] ? __kernfs_new_node+0x6a/0x380 [ 1270.023009][ T9247] __should_failslab+0x92/0xa0 [ 1270.027831][ T9247] should_failslab+0x9/0x20 [ 1270.032379][ T9247] kmem_cache_alloc+0x4e/0x250 [ 1270.037153][ T9247] __kernfs_new_node+0x6a/0x380 [ 1270.042034][ T9247] ? rb_insert_color+0x280/0x290 [ 1270.046979][ T9247] ? up_write+0x30/0xe0 [ 1270.051136][ T9247] ? kernfs_activate+0x252/0x270 [ 1270.056125][ T9247] kernfs_new_node+0x5f/0xd0 [ 1270.060758][ T9247] __kernfs_create_file+0x49/0x180 [ 1270.065875][ T9247] ? dev_attr_show+0x90/0x90 [ 1270.070551][ T9247] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1270.075937][ T9247] internal_create_group+0x2e4/0x800 [ 1270.081288][ T9247] sysfs_create_groups+0x3c/0xe0 [ 1270.086235][ T9247] device_add_attrs+0x69/0x400 [ 1270.091063][ T9247] ? kobject_put+0xd8/0x160 [ 1270.095611][ T9247] device_add+0x431/0x8b0 [ 1270.099961][ T9247] netdev_register_kobject+0xfc/0x230 [ 1270.105346][ T9247] register_netdevice+0x86f/0xd60 [ 1270.110436][ T9247] ? mutex_lock+0xd/0x30 [ 1270.114746][ T9247] wg_newlink+0x3b2/0x580 [ 1270.119087][ T9247] ? wg_setup+0x1d0/0x1d0 [ 1270.123425][ T9247] rtnl_newlink+0xee5/0x1670 [ 1270.128036][ T9247] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1270.134358][ T9247] ? _raw_spin_unlock+0x26/0x40 [ 1270.139299][ T9247] ? __mutex_lock+0x21c/0x8d0 [ 1270.144010][ T9247] ? rtnl_setlink+0x300/0x300 [ 1270.148758][ T9247] rtnetlink_rcv_msg+0x807/0x8c0 [ 1270.153705][ T9247] ? memcg_list_lru_alloc+0xd5/0x750 [ 1270.159021][ T9247] ? security_inode_alloc+0x32/0xd0 [ 1270.164221][ T9247] ? slab_post_alloc_hook+0x82/0x2f0 [ 1270.169510][ T9247] ? kmem_cache_free+0x1d9/0x380 [ 1270.174461][ T9247] ? __kfree_skb+0x104/0x140 [ 1270.179054][ T9247] ? nlmon_xmit+0x4b/0x60 [ 1270.183392][ T9247] ? __kfree_skb+0x104/0x140 [ 1270.187988][ T9247] ? consume_skb+0x57/0x180 [ 1270.192490][ T9247] ? nlmon_xmit+0x4b/0x60 [ 1270.196825][ T9247] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1270.202137][ T9247] ? __dev_queue_xmit+0xaae/0x1d80 [ 1270.207306][ T9247] ? ref_tracker_free+0x3a1/0x400 [ 1270.212463][ T9247] netlink_rcv_skb+0x126/0x220 [ 1270.217231][ T9247] ? rtnetlink_bind+0x60/0x60 [ 1270.221925][ T9247] rtnetlink_rcv+0x1c/0x20 [ 1270.226357][ T9247] netlink_unicast+0x589/0x650 [ 1270.231142][ T9247] netlink_sendmsg+0x66e/0x770 [ 1270.235959][ T9247] ? netlink_getsockopt+0x3e0/0x3e0 [ 1270.241153][ T9247] ____sys_sendmsg+0x37c/0x4d0 [ 1270.245971][ T9247] __sys_sendmsg+0x1e9/0x270 [ 1270.250568][ T9247] __x64_sys_sendmsg+0x46/0x50 [ 1270.255331][ T9247] do_syscall_64+0x44/0x110 [ 1270.259844][ T9247] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1270.265779][ T9247] RIP: 0033:0x7efd2e8d0ce9 [ 1270.270188][ T9247] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1270.289934][ T9247] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1270.298347][ T9247] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1270.306313][ T9247] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1270.314335][ T9247] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1270.322311][ T9247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1270.330396][ T9247] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1270.338438][ T9247] 03:19:55 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef011a00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1270.379546][ T9251] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1270.403789][ T9251] wireguard12: entered promiscuous mode [ 1270.409472][ T9251] wireguard12: entered allmulticast mode [ 1270.502284][ T9256] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1270.546507][ T9256] wireguard15: entered promiscuous mode [ 1270.552136][ T9256] wireguard15: entered allmulticast mode 03:19:55 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 54) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:55 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) (async) r0 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) 03:19:55 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef004003000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:55 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef001d00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1270.814887][ T9263] wireguard12: entered promiscuous mode [ 1270.820459][ T9263] wireguard12: entered allmulticast mode [ 1270.878627][ T9267] FAULT_INJECTION: forcing a failure. [ 1270.878627][ T9267] name failslab, interval 1, probability 0, space 0, times 0 [ 1270.891319][ T9267] CPU: 0 PID: 9267 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1270.901701][ T9267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1270.911807][ T9267] Call Trace: [ 1270.915087][ T9267] [ 1270.918018][ T9267] dump_stack_lvl+0xda/0x130 [ 1270.922696][ T9267] dump_stack+0x15/0x20 [ 1270.926906][ T9267] should_fail_ex+0x21f/0x230 [ 1270.931591][ T9267] ? __kernfs_new_node+0x6a/0x380 [ 1270.936766][ T9267] __should_failslab+0x92/0xa0 [ 1270.941546][ T9267] should_failslab+0x9/0x20 [ 1270.946124][ T9267] kmem_cache_alloc+0x4e/0x250 [ 1270.950948][ T9267] __kernfs_new_node+0x6a/0x380 [ 1270.955804][ T9267] ? rb_insert_color+0x280/0x290 [ 1270.960748][ T9267] ? up_write+0x30/0xe0 [ 1270.964941][ T9267] ? kernfs_activate+0x252/0x270 [ 1270.969938][ T9267] kernfs_new_node+0x5f/0xd0 [ 1270.974751][ T9267] __kernfs_create_file+0x49/0x180 [ 1270.980027][ T9267] ? dev_attr_show+0x90/0x90 [ 1270.984621][ T9267] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1270.990037][ T9267] internal_create_group+0x2e4/0x800 [ 1270.995351][ T9267] sysfs_create_groups+0x3c/0xe0 [ 1271.000291][ T9267] device_add_attrs+0x69/0x400 [ 1271.005131][ T9267] ? kobject_put+0xd8/0x160 [ 1271.009702][ T9267] device_add+0x431/0x8b0 [ 1271.014047][ T9267] netdev_register_kobject+0xfc/0x230 [ 1271.019435][ T9267] register_netdevice+0x86f/0xd60 [ 1271.024470][ T9267] ? mutex_lock+0xd/0x30 [ 1271.028802][ T9267] wg_newlink+0x3b2/0x580 [ 1271.033168][ T9267] ? wg_setup+0x1d0/0x1d0 [ 1271.037580][ T9267] rtnl_newlink+0xee5/0x1670 [ 1271.042198][ T9267] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1271.048493][ T9267] ? _raw_spin_unlock+0x26/0x40 [ 1271.053345][ T9267] ? __mutex_lock+0x21c/0x8d0 [ 1271.058101][ T9267] ? rtnl_setlink+0x300/0x300 [ 1271.062889][ T9267] rtnetlink_rcv_msg+0x807/0x8c0 [ 1271.067867][ T9267] ? __rcu_read_unlock+0x4d/0x70 [ 1271.072927][ T9267] ? __rcu_read_unlock+0x4d/0x70 [ 1271.077867][ T9267] ? __refill_stock+0x7f/0xb0 [ 1271.082635][ T9267] ? kmem_cache_free+0x1d9/0x380 [ 1271.087669][ T9267] ? __kfree_skb+0x104/0x140 [ 1271.092254][ T9267] ? nlmon_xmit+0x4b/0x60 [ 1271.096585][ T9267] ? __kfree_skb+0x104/0x140 [ 1271.101181][ T9267] ? consume_skb+0x57/0x180 [ 1271.105769][ T9267] ? nlmon_xmit+0x4b/0x60 [ 1271.110107][ T9267] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1271.115421][ T9267] ? __dev_queue_xmit+0xaae/0x1d80 [ 1271.120598][ T9267] ? ref_tracker_free+0x3a1/0x400 [ 1271.125626][ T9267] netlink_rcv_skb+0x126/0x220 [ 1271.130397][ T9267] ? rtnetlink_bind+0x60/0x60 [ 1271.135079][ T9267] rtnetlink_rcv+0x1c/0x20 [ 1271.139512][ T9267] netlink_unicast+0x589/0x650 [ 1271.144386][ T9267] netlink_sendmsg+0x66e/0x770 [ 1271.149228][ T9267] ? netlink_getsockopt+0x3e0/0x3e0 [ 1271.154499][ T9267] ____sys_sendmsg+0x37c/0x4d0 [ 1271.159269][ T9267] __sys_sendmsg+0x1e9/0x270 [ 1271.163869][ T9267] __x64_sys_sendmsg+0x46/0x50 [ 1271.168634][ T9267] do_syscall_64+0x44/0x110 [ 1271.173156][ T9267] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1271.179139][ T9267] RIP: 0033:0x7efd2e8d0ce9 [ 1271.183604][ T9267] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1271.203489][ T9267] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1271.211910][ T9267] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1271.219886][ T9267] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1271.227925][ T9267] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1271.235901][ T9267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1271.243913][ T9267] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1271.251931][ T9267] [ 1271.262870][ T9268] wireguard15: entered promiscuous mode [ 1271.268540][ T9268] wireguard15: entered allmulticast mode 03:19:57 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef002000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:57 executing program 4: r0 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', 0x0, &(0x7f0000000380)='\x00\x00', 0x2, r0) r1 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', 0x0, &(0x7f0000000380)='\x00\x00', 0x2, r1) keyctl$search(0xa, r0, &(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x1}, r1) shmctl$IPC_RMID(0x0, 0x0) r2 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x3000) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:19:57 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefffff03000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 55) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:57 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x101000, 0x0, 0x0, 0x0) mlockall(0x0) 03:19:57 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0c95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1271.878709][ T9278] wireguard12: entered promiscuous mode [ 1271.884346][ T9278] wireguard12: entered allmulticast mode [ 1271.909421][ T9282] wireguard15: entered promiscuous mode [ 1271.915036][ T9282] wireguard15: entered allmulticast mode [ 1271.951390][ T9288] FAULT_INJECTION: forcing a failure. [ 1271.951390][ T9288] name failslab, interval 1, probability 0, space 0, times 0 [ 1271.964048][ T9288] CPU: 1 PID: 9288 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1271.974390][ T9288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1271.984496][ T9288] Call Trace: [ 1271.987849][ T9288] [ 1271.990840][ T9288] dump_stack_lvl+0xda/0x130 [ 1271.995445][ T9288] dump_stack+0x15/0x20 [ 1271.999624][ T9288] should_fail_ex+0x21f/0x230 [ 1272.004417][ T9288] ? __kernfs_new_node+0x6a/0x380 [ 1272.009444][ T9288] __should_failslab+0x92/0xa0 [ 1272.014219][ T9288] should_failslab+0x9/0x20 [ 1272.018733][ T9288] kmem_cache_alloc+0x4e/0x250 [ 1272.023517][ T9288] __kernfs_new_node+0x6a/0x380 [ 1272.028389][ T9288] ? rb_insert_color+0x280/0x290 [ 1272.033339][ T9288] ? up_write+0x30/0xe0 [ 1272.037495][ T9288] ? kernfs_activate+0x252/0x270 [ 1272.042435][ T9288] kernfs_new_node+0x5f/0xd0 [ 1272.047039][ T9288] __kernfs_create_file+0x49/0x180 [ 1272.052164][ T9288] ? dev_attr_show+0x90/0x90 [ 1272.056799][ T9288] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1272.062189][ T9288] internal_create_group+0x2e4/0x800 [ 1272.067532][ T9288] sysfs_create_groups+0x3c/0xe0 [ 1272.072510][ T9288] device_add_attrs+0x69/0x400 [ 1272.077298][ T9288] ? kobject_put+0xd8/0x160 [ 1272.082133][ T9288] device_add+0x431/0x8b0 [ 1272.086497][ T9288] netdev_register_kobject+0xfc/0x230 [ 1272.091886][ T9288] register_netdevice+0x86f/0xd60 [ 1272.096970][ T9288] ? mutex_lock+0xd/0x30 [ 1272.101235][ T9288] wg_newlink+0x3b2/0x580 [ 1272.105581][ T9288] ? wg_setup+0x1d0/0x1d0 [ 1272.109971][ T9288] rtnl_newlink+0xee5/0x1670 [ 1272.114661][ T9288] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1272.120951][ T9288] ? _raw_spin_unlock+0x26/0x40 [ 1272.125832][ T9288] ? __mutex_lock+0x21c/0x8d0 [ 1272.130577][ T9288] ? rtnl_setlink+0x300/0x300 [ 1272.135267][ T9288] rtnetlink_rcv_msg+0x807/0x8c0 [ 1272.140206][ T9288] ? memcg_list_lru_alloc+0xd5/0x750 [ 1272.145584][ T9288] ? mod_objcg_state+0x357/0x580 [ 1272.150570][ T9288] ? slab_post_alloc_hook+0x82/0x2f0 [ 1272.155941][ T9288] ? kmem_cache_free+0x1d9/0x380 [ 1272.160966][ T9288] ? __kfree_skb+0x104/0x140 [ 1272.165685][ T9288] ? nlmon_xmit+0x4b/0x60 [ 1272.170087][ T9288] ? __kfree_skb+0x104/0x140 [ 1272.174737][ T9288] ? consume_skb+0x57/0x180 [ 1272.179240][ T9288] ? nlmon_xmit+0x4b/0x60 [ 1272.183651][ T9288] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1272.188989][ T9288] ? __dev_queue_xmit+0xaae/0x1d80 [ 1272.194118][ T9288] ? ref_tracker_free+0x3a1/0x400 [ 1272.199174][ T9288] netlink_rcv_skb+0x126/0x220 [ 1272.203937][ T9288] ? rtnetlink_bind+0x60/0x60 [ 1272.208671][ T9288] rtnetlink_rcv+0x1c/0x20 [ 1272.213087][ T9288] netlink_unicast+0x589/0x650 [ 1272.217859][ T9288] netlink_sendmsg+0x66e/0x770 [ 1272.222625][ T9288] ? netlink_getsockopt+0x3e0/0x3e0 [ 1272.227844][ T9288] ____sys_sendmsg+0x37c/0x4d0 [ 1272.232619][ T9288] __sys_sendmsg+0x1e9/0x270 [ 1272.237274][ T9288] __x64_sys_sendmsg+0x46/0x50 [ 1272.242044][ T9288] do_syscall_64+0x44/0x110 [ 1272.246608][ T9288] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1272.252591][ T9288] RIP: 0033:0x7efd2e8d0ce9 [ 1272.257043][ T9288] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1272.276661][ T9288] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1272.285071][ T9288] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1272.293070][ T9288] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1272.301080][ T9288] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1272.309061][ T9288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1272.317141][ T9288] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1272.325116][ T9288] 03:19:57 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000004000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:57 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef022200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1272.503213][ T9300] wireguard12: entered promiscuous mode [ 1272.508858][ T9300] wireguard12: entered allmulticast mode 03:19:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 56) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1272.669051][ T9302] wireguard15: entered promiscuous mode [ 1272.674656][ T9302] wireguard15: entered allmulticast mode 03:19:57 executing program 4: r0 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', 0x0, &(0x7f0000000380)='\x00\x00', 0x2, r0) r1 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', 0x0, &(0x7f0000000380)='\x00\x00', 0x2, r1) keyctl$search(0xa, r0, &(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x1}, r1) (async) shmctl$IPC_RMID(0x0, 0x0) (async) r2 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x3000) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 1272.785248][ T9314] FAULT_INJECTION: forcing a failure. [ 1272.785248][ T9314] name failslab, interval 1, probability 0, space 0, times 0 [ 1272.797901][ T9314] CPU: 1 PID: 9314 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1272.808262][ T9314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1272.818319][ T9314] Call Trace: [ 1272.821597][ T9314] [ 1272.824551][ T9314] dump_stack_lvl+0xda/0x130 [ 1272.829279][ T9314] dump_stack+0x15/0x20 [ 1272.833438][ T9314] should_fail_ex+0x21f/0x230 [ 1272.838214][ T9314] ? __kernfs_new_node+0x6a/0x380 [ 1272.843263][ T9314] __should_failslab+0x92/0xa0 [ 1272.848038][ T9314] should_failslab+0x9/0x20 [ 1272.852675][ T9314] kmem_cache_alloc+0x4e/0x250 [ 1272.857455][ T9314] __kernfs_new_node+0x6a/0x380 [ 1272.862310][ T9314] ? rb_insert_color+0x6a/0x290 [ 1272.867234][ T9314] ? up_write+0x30/0xe0 [ 1272.871384][ T9314] ? kernfs_activate+0x252/0x270 [ 1272.876359][ T9314] kernfs_new_node+0x5f/0xd0 [ 1272.881005][ T9314] __kernfs_create_file+0x49/0x180 [ 1272.886207][ T9314] ? dev_attr_show+0x90/0x90 [ 1272.890795][ T9314] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1272.896250][ T9314] internal_create_group+0x2e4/0x800 [ 1272.901551][ T9314] sysfs_create_groups+0x3c/0xe0 [ 1272.906501][ T9314] device_add_attrs+0x69/0x400 [ 1272.911360][ T9314] ? kobject_put+0xd8/0x160 [ 1272.915887][ T9314] device_add+0x431/0x8b0 [ 1272.920230][ T9314] netdev_register_kobject+0xfc/0x230 [ 1272.925624][ T9314] register_netdevice+0x86f/0xd60 [ 1272.930714][ T9314] ? mutex_lock+0xd/0x30 [ 1272.935040][ T9314] wg_newlink+0x3b2/0x580 [ 1272.939387][ T9314] ? wg_setup+0x1d0/0x1d0 [ 1272.943726][ T9314] rtnl_newlink+0xee5/0x1670 [ 1272.948399][ T9314] ? security_capable+0x5e/0x80 [ 1272.953261][ T9314] ? ns_capable+0x7c/0xb0 [ 1272.957591][ T9314] ? rtnl_setlink+0x300/0x300 [ 1272.962282][ T9314] rtnetlink_rcv_msg+0x807/0x8c0 [ 1272.967273][ T9314] ? memcg_list_lru_alloc+0xd5/0x750 [ 1272.972593][ T9314] ? mod_objcg_state+0x357/0x580 [ 1272.977751][ T9314] ? slab_post_alloc_hook+0x82/0x2f0 03:19:58 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x1000000, 0x0, 0x0, 0x0) mlockall(0x0) [ 1272.983052][ T9314] ? kmem_cache_free+0x1d9/0x380 [ 1272.988022][ T9314] ? __kfree_skb+0x104/0x140 [ 1272.992815][ T9314] ? nlmon_xmit+0x4b/0x60 [ 1272.997164][ T9314] ? __kfree_skb+0x104/0x140 [ 1273.001760][ T9314] ? consume_skb+0x57/0x180 [ 1273.006304][ T9314] ? nlmon_xmit+0x4b/0x60 [ 1273.010641][ T9314] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1273.016017][ T9314] ? __dev_queue_xmit+0xaae/0x1d80 [ 1273.021134][ T9314] ? ref_tracker_free+0x3a1/0x400 [ 1273.026246][ T9314] netlink_rcv_skb+0x126/0x220 [ 1273.031017][ T9314] ? rtnetlink_bind+0x60/0x60 [ 1273.035792][ T9314] rtnetlink_rcv+0x1c/0x20 [ 1273.040216][ T9314] netlink_unicast+0x589/0x650 [ 1273.044993][ T9314] netlink_sendmsg+0x66e/0x770 [ 1273.049854][ T9314] ? netlink_getsockopt+0x3e0/0x3e0 [ 1273.055209][ T9314] ____sys_sendmsg+0x37c/0x4d0 [ 1273.060048][ T9314] __sys_sendmsg+0x1e9/0x270 [ 1273.064652][ T9314] __x64_sys_sendmsg+0x46/0x50 [ 1273.069476][ T9314] do_syscall_64+0x44/0x110 [ 1273.074046][ T9314] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1273.080126][ T9314] RIP: 0033:0x7efd2e8d0ce9 03:19:58 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0d95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1273.084554][ T9314] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1273.104163][ T9314] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1273.112656][ T9314] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1273.120630][ T9314] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1273.128622][ T9314] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 03:19:58 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00000b000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1273.136592][ T9314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1273.144563][ T9314] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1273.152537][ T9314] 03:19:58 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefed2200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1273.263560][ T9323] wireguard12: entered promiscuous mode [ 1273.269192][ T9323] wireguard12: entered allmulticast mode [ 1273.304663][ T9327] wireguard15: entered promiscuous mode [ 1273.310273][ T9327] wireguard15: entered allmulticast mode 03:19:58 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000010000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:19:58 executing program 4: r0 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', 0x0, &(0x7f0000000380)='\x00\x00', 0x2, r0) (async) r1 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='dns_resolver\x00', 0x0, &(0x7f0000000380)='\x00\x00', 0x2, r1) (async) keyctl$search(0xa, r0, &(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x1}, r1) shmctl$IPC_RMID(0x0, 0x0) (async) r2 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) (async) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x3000) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:19:58 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefee2200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:58 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 57) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:58 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0e95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1273.535227][ T9336] wireguard15: entered promiscuous mode [ 1273.540916][ T9336] wireguard15: entered allmulticast mode [ 1273.638714][ T9333] wireguard12: entered promiscuous mode [ 1273.644375][ T9333] wireguard12: entered allmulticast mode [ 1273.688059][ T9350] FAULT_INJECTION: forcing a failure. [ 1273.688059][ T9350] name failslab, interval 1, probability 0, space 0, times 0 [ 1273.700827][ T9350] CPU: 1 PID: 9350 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1273.711216][ T9350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1273.721278][ T9350] Call Trace: [ 1273.724557][ T9350] [ 1273.727528][ T9350] dump_stack_lvl+0xda/0x130 [ 1273.732138][ T9350] dump_stack+0x15/0x20 [ 1273.736390][ T9350] should_fail_ex+0x21f/0x230 [ 1273.741083][ T9350] ? __kernfs_new_node+0x6a/0x380 [ 1273.746131][ T9350] __should_failslab+0x92/0xa0 [ 1273.750905][ T9350] should_failslab+0x9/0x20 [ 1273.755418][ T9350] kmem_cache_alloc+0x4e/0x250 [ 1273.760222][ T9350] __kernfs_new_node+0x6a/0x380 [ 1273.765090][ T9350] ? rb_insert_color+0x6a/0x290 [ 1273.770014][ T9350] ? up_write+0x30/0xe0 [ 1273.774173][ T9350] ? kernfs_activate+0x252/0x270 [ 1273.779162][ T9350] kernfs_new_node+0x5f/0xd0 [ 1273.783761][ T9350] __kernfs_create_file+0x49/0x180 [ 1273.788916][ T9350] ? dev_attr_show+0x90/0x90 [ 1273.793516][ T9350] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1273.798906][ T9350] internal_create_group+0x2e4/0x800 [ 1273.804291][ T9350] sysfs_create_groups+0x3c/0xe0 [ 1273.809230][ T9350] device_add_attrs+0x69/0x400 [ 1273.814037][ T9350] ? kobject_put+0xd8/0x160 [ 1273.818550][ T9350] device_add+0x431/0x8b0 [ 1273.822912][ T9350] netdev_register_kobject+0xfc/0x230 [ 1273.828358][ T9350] register_netdevice+0x86f/0xd60 [ 1273.833399][ T9350] ? mutex_lock+0xd/0x30 [ 1273.837657][ T9350] wg_newlink+0x3b2/0x580 [ 1273.842102][ T9350] ? wg_setup+0x1d0/0x1d0 [ 1273.846440][ T9350] rtnl_newlink+0xee5/0x1670 [ 1273.851065][ T9350] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1273.857330][ T9350] ? _raw_spin_unlock+0x26/0x40 [ 1273.862243][ T9350] ? __mutex_lock+0x21c/0x8d0 [ 1273.867003][ T9350] ? rtnl_setlink+0x300/0x300 [ 1273.871697][ T9350] rtnetlink_rcv_msg+0x807/0x8c0 [ 1273.876717][ T9350] ? memcg_list_lru_alloc+0xd5/0x750 [ 1273.882147][ T9350] ? mod_objcg_state+0x357/0x580 [ 1273.887100][ T9350] ? slab_post_alloc_hook+0x82/0x2f0 [ 1273.892432][ T9350] ? kmem_cache_free+0x1d9/0x380 [ 1273.897434][ T9350] ? __kfree_skb+0x104/0x140 [ 1273.902019][ T9350] ? nlmon_xmit+0x4b/0x60 [ 1273.906390][ T9350] ? __kfree_skb+0x104/0x140 [ 1273.912369][ T9350] ? consume_skb+0x57/0x180 [ 1273.916914][ T9350] ? nlmon_xmit+0x4b/0x60 [ 1273.921296][ T9350] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1273.926589][ T9350] ? __dev_queue_xmit+0xaae/0x1d80 [ 1273.931711][ T9350] ? ref_tracker_free+0x3a1/0x400 03:19:59 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x2000000, 0x0, 0x0, 0x0) mlockall(0x0) [ 1273.936802][ T9350] netlink_rcv_skb+0x126/0x220 [ 1273.941572][ T9350] ? rtnetlink_bind+0x60/0x60 [ 1273.946290][ T9350] rtnetlink_rcv+0x1c/0x20 [ 1273.950788][ T9350] netlink_unicast+0x589/0x650 [ 1273.955612][ T9350] netlink_sendmsg+0x66e/0x770 [ 1273.960388][ T9350] ? netlink_getsockopt+0x3e0/0x3e0 [ 1273.965589][ T9350] ____sys_sendmsg+0x37c/0x4d0 [ 1273.970361][ T9350] __sys_sendmsg+0x1e9/0x270 [ 1273.975046][ T9350] __x64_sys_sendmsg+0x46/0x50 [ 1273.979885][ T9350] do_syscall_64+0x44/0x110 [ 1273.984403][ T9350] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1273.990311][ T9350] RIP: 0033:0x7efd2e8d0ce9 [ 1273.994796][ T9350] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1274.014553][ T9350] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1274.022971][ T9350] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1274.030962][ T9350] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1274.038933][ T9350] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1274.046951][ T9350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1274.054925][ T9350] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1274.063000][ T9350] 03:19:59 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefef2200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:59 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000340000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1274.183646][ T9358] __nla_validate_parse: 18 callbacks suppressed [ 1274.190002][ T9358] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1274.256108][ T9358] wireguard15: entered promiscuous mode [ 1274.261696][ T9358] wireguard15: entered allmulticast mode [ 1274.309852][ T9361] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1274.354066][ T9361] wireguard12: entered promiscuous mode [ 1274.359732][ T9361] wireguard12: entered allmulticast mode 03:19:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 58) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:19:59 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef002400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:19:59 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000080000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1274.506452][ T9368] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1274.557377][ T9368] wireguard15: entered promiscuous mode [ 1274.563003][ T9368] wireguard15: entered allmulticast mode [ 1274.657541][ T9369] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1274.666806][ T9369] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1274.676957][ T9369] FAULT_INJECTION: forcing a failure. [ 1274.676957][ T9369] name failslab, interval 1, probability 0, space 0, times 0 [ 1274.689575][ T9369] CPU: 1 PID: 9369 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 03:19:59 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) mlockall(0xa36128df7d60d922) [ 1274.699974][ T9369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1274.710026][ T9369] Call Trace: [ 1274.713429][ T9369] [ 1274.716395][ T9369] dump_stack_lvl+0xda/0x130 [ 1274.721056][ T9369] dump_stack+0x15/0x20 [ 1274.725272][ T9369] should_fail_ex+0x21f/0x230 [ 1274.729986][ T9369] ? __kernfs_new_node+0x6a/0x380 [ 1274.735044][ T9369] __should_failslab+0x92/0xa0 [ 1274.739825][ T9369] should_failslab+0x9/0x20 [ 1274.744413][ T9369] kmem_cache_alloc+0x4e/0x250 [ 1274.749185][ T9369] __kernfs_new_node+0x6a/0x380 [ 1274.754131][ T9369] ? rb_insert_color+0x6a/0x290 [ 1274.758991][ T9369] ? up_write+0x30/0xe0 [ 1274.763173][ T9369] ? kernfs_activate+0x252/0x270 [ 1274.768108][ T9369] kernfs_new_node+0x5f/0xd0 [ 1274.772703][ T9369] __kernfs_create_file+0x49/0x180 [ 1274.777822][ T9369] ? dev_attr_show+0x90/0x90 [ 1274.782445][ T9369] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1274.787898][ T9369] internal_create_group+0x2e4/0x800 [ 1274.793197][ T9369] sysfs_create_groups+0x3c/0xe0 [ 1274.798175][ T9369] device_add_attrs+0x69/0x400 [ 1274.802955][ T9369] ? kobject_put+0xd8/0x160 [ 1274.807511][ T9369] device_add+0x431/0x8b0 [ 1274.811896][ T9369] netdev_register_kobject+0xfc/0x230 [ 1274.817283][ T9369] register_netdevice+0x86f/0xd60 [ 1274.822323][ T9369] ? mutex_lock+0xd/0x30 [ 1274.826657][ T9369] wg_newlink+0x3b2/0x580 [ 1274.831000][ T9369] ? wg_setup+0x1d0/0x1d0 [ 1274.835431][ T9369] rtnl_newlink+0xee5/0x1670 [ 1274.840038][ T9369] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1274.846289][ T9369] ? _raw_spin_unlock+0x26/0x40 [ 1274.851156][ T9369] ? __mutex_lock+0x21c/0x8d0 [ 1274.855854][ T9369] ? rtnl_setlink+0x300/0x300 [ 1274.860607][ T9369] rtnetlink_rcv_msg+0x807/0x8c0 [ 1274.865557][ T9369] ? memcg_list_lru_alloc+0xd5/0x750 [ 1274.870897][ T9369] ? mod_objcg_state+0x357/0x580 [ 1274.875852][ T9369] ? slab_post_alloc_hook+0x82/0x2f0 [ 1274.881199][ T9369] ? kmem_cache_free+0x1d9/0x380 [ 1274.886225][ T9369] ? __kfree_skb+0x104/0x140 [ 1274.890869][ T9369] ? nlmon_xmit+0x4b/0x60 [ 1274.895214][ T9369] ? __kfree_skb+0x104/0x140 [ 1274.899805][ T9369] ? consume_skb+0x57/0x180 [ 1274.904307][ T9369] ? nlmon_xmit+0x4b/0x60 [ 1274.908687][ T9369] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1274.914062][ T9369] ? __dev_queue_xmit+0xaae/0x1d80 [ 1274.919223][ T9369] ? ref_tracker_free+0x3a1/0x400 [ 1274.924271][ T9369] netlink_rcv_skb+0x126/0x220 [ 1274.929037][ T9369] ? rtnetlink_bind+0x60/0x60 [ 1274.933784][ T9369] rtnetlink_rcv+0x1c/0x20 [ 1274.938282][ T9369] netlink_unicast+0x589/0x650 [ 1274.943118][ T9369] netlink_sendmsg+0x66e/0x770 [ 1274.947901][ T9369] ? netlink_getsockopt+0x3e0/0x3e0 [ 1274.953108][ T9369] ____sys_sendmsg+0x37c/0x4d0 [ 1274.957887][ T9369] __sys_sendmsg+0x1e9/0x270 [ 1274.962947][ T9369] __x64_sys_sendmsg+0x46/0x50 [ 1274.967713][ T9369] do_syscall_64+0x44/0x110 [ 1274.972262][ T9369] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1274.978169][ T9369] RIP: 0033:0x7efd2e8d0ce9 [ 1274.982672][ T9369] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1275.002282][ T9369] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1275.010694][ T9369] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1275.018667][ T9369] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1275.026682][ T9369] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1275.034657][ T9369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1275.042630][ T9369] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1275.050682][ T9369] [ 1275.068671][ T9371] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1275.082907][ T9371] wireguard12: entered promiscuous mode [ 1275.088538][ T9371] wireguard12: entered allmulticast mode 03:20:00 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef002500000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:00 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000010000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1275.177689][ T9381] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1275.201048][ T9381] wireguard15: entered promiscuous mode [ 1275.206688][ T9381] wireguard15: entered allmulticast mode 03:20:00 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 59) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1275.277996][ T9386] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:20:00 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef032800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1275.338600][ T9386] wireguard12: entered promiscuous mode [ 1275.344230][ T9386] wireguard12: entered allmulticast mode [ 1275.447443][ T9390] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1275.456726][ T9390] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1275.467565][ T9390] FAULT_INJECTION: forcing a failure. [ 1275.467565][ T9390] name failslab, interval 1, probability 0, space 0, times 0 [ 1275.480280][ T9390] CPU: 0 PID: 9390 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1275.490668][ T9390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1275.500792][ T9390] Call Trace: [ 1275.504086][ T9390] [ 1275.507011][ T9390] dump_stack_lvl+0xda/0x130 [ 1275.511663][ T9390] dump_stack+0x15/0x20 [ 1275.515816][ T9390] should_fail_ex+0x21f/0x230 [ 1275.520587][ T9390] ? __kernfs_new_node+0x6a/0x380 [ 1275.525604][ T9390] __should_failslab+0x92/0xa0 [ 1275.530389][ T9390] should_failslab+0x9/0x20 [ 1275.534884][ T9390] kmem_cache_alloc+0x4e/0x250 [ 1275.539826][ T9390] __kernfs_new_node+0x6a/0x380 [ 1275.544674][ T9390] ? rb_insert_color+0x263/0x290 [ 1275.549649][ T9390] ? up_write+0x30/0xe0 [ 1275.553794][ T9390] ? kernfs_activate+0x252/0x270 [ 1275.558821][ T9390] kernfs_new_node+0x5f/0xd0 [ 1275.563402][ T9390] __kernfs_create_file+0x49/0x180 [ 1275.568579][ T9390] ? dev_attr_show+0x90/0x90 [ 1275.573243][ T9390] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1275.578671][ T9390] internal_create_group+0x2e4/0x800 [ 1275.583986][ T9390] sysfs_create_groups+0x3c/0xe0 [ 1275.588963][ T9390] device_add_attrs+0x69/0x400 [ 1275.593744][ T9390] ? kobject_put+0xd8/0x160 [ 1275.598372][ T9390] device_add+0x431/0x8b0 [ 1275.602698][ T9390] netdev_register_kobject+0xfc/0x230 [ 1275.608079][ T9390] register_netdevice+0x86f/0xd60 [ 1275.613165][ T9390] ? mutex_lock+0xd/0x30 [ 1275.617438][ T9390] wg_newlink+0x3b2/0x580 [ 1275.621826][ T9390] ? wg_setup+0x1d0/0x1d0 [ 1275.626170][ T9390] rtnl_newlink+0xee5/0x1670 [ 1275.630801][ T9390] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1275.637037][ T9390] ? _raw_spin_unlock+0x26/0x40 [ 1275.641876][ T9390] ? __mutex_lock+0x21c/0x8d0 [ 1275.646582][ T9390] ? rtnl_setlink+0x300/0x300 [ 1275.651252][ T9390] rtnetlink_rcv_msg+0x807/0x8c0 [ 1275.656201][ T9390] ? memcg_list_lru_alloc+0xd5/0x750 [ 1275.661502][ T9390] ? mod_objcg_state+0x357/0x580 [ 1275.666434][ T9390] ? slab_post_alloc_hook+0x82/0x2f0 [ 1275.671743][ T9390] ? kmem_cache_free+0x1d9/0x380 [ 1275.676693][ T9390] ? __kfree_skb+0x104/0x140 [ 1275.681331][ T9390] ? nlmon_xmit+0x4b/0x60 [ 1275.685651][ T9390] ? __kfree_skb+0x104/0x140 [ 1275.690274][ T9390] ? consume_skb+0x57/0x180 [ 1275.694763][ T9390] ? nlmon_xmit+0x4b/0x60 [ 1275.699201][ T9390] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1275.704519][ T9390] ? __dev_queue_xmit+0xaae/0x1d80 [ 1275.709635][ T9390] ? ref_tracker_free+0x3a1/0x400 [ 1275.714653][ T9390] netlink_rcv_skb+0x126/0x220 [ 1275.722206][ T9390] ? rtnetlink_bind+0x60/0x60 [ 1275.726911][ T9390] rtnetlink_rcv+0x1c/0x20 [ 1275.731327][ T9390] netlink_unicast+0x589/0x650 [ 1275.736222][ T9390] netlink_sendmsg+0x66e/0x770 [ 1275.741019][ T9390] ? netlink_getsockopt+0x3e0/0x3e0 [ 1275.746215][ T9390] ____sys_sendmsg+0x37c/0x4d0 [ 1275.751087][ T9390] __sys_sendmsg+0x1e9/0x270 [ 1275.755776][ T9390] __x64_sys_sendmsg+0x46/0x50 [ 1275.760608][ T9390] do_syscall_64+0x44/0x110 [ 1275.765184][ T9390] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1275.771070][ T9390] RIP: 0033:0x7efd2e8d0ce9 [ 1275.775473][ T9390] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1275.795248][ T9390] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1275.803648][ T9390] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1275.811610][ T9390] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1275.819574][ T9390] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1275.827535][ T9390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1275.835492][ T9390] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1275.843459][ T9390] [ 1275.920414][ T9392] wireguard15: entered promiscuous mode [ 1275.926017][ T9392] wireguard15: entered allmulticast mode 03:20:01 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e1095484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:01 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x4000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:20:01 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00000b010000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 60) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:01 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef022e00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1276.738488][ T9399] wireguard12: entered promiscuous mode [ 1276.744153][ T9399] wireguard12: entered allmulticast mode [ 1276.780430][ T9401] wireguard15: entered promiscuous mode [ 1276.786108][ T9401] wireguard15: entered allmulticast mode [ 1276.862168][ T9411] FAULT_INJECTION: forcing a failure. [ 1276.862168][ T9411] name failslab, interval 1, probability 0, space 0, times 0 [ 1276.874899][ T9411] CPU: 1 PID: 9411 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1276.885232][ T9411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1276.895450][ T9411] Call Trace: [ 1276.898727][ T9411] [ 1276.901650][ T9411] dump_stack_lvl+0xda/0x130 [ 1276.906294][ T9411] dump_stack+0x15/0x20 03:20:02 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) mlockall(0xa36128df7d60d922) [ 1276.910533][ T9411] should_fail_ex+0x21f/0x230 [ 1276.915246][ T9411] ? __kernfs_new_node+0x6a/0x380 [ 1276.920385][ T9411] __should_failslab+0x92/0xa0 [ 1276.925167][ T9411] should_failslab+0x9/0x20 [ 1276.929760][ T9411] kmem_cache_alloc+0x4e/0x250 [ 1276.934538][ T9411] __kernfs_new_node+0x6a/0x380 [ 1276.939398][ T9411] ? rb_insert_color+0x6a/0x290 [ 1276.944317][ T9411] ? up_write+0x30/0xe0 [ 1276.948478][ T9411] ? kernfs_activate+0x252/0x270 [ 1276.953439][ T9411] kernfs_new_node+0x5f/0xd0 [ 1276.958037][ T9411] __kernfs_create_file+0x49/0x180 [ 1276.963209][ T9411] ? dev_attr_show+0x90/0x90 [ 1276.967816][ T9411] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1276.973206][ T9411] internal_create_group+0x2e4/0x800 [ 1276.978505][ T9411] sysfs_create_groups+0x3c/0xe0 [ 1276.983477][ T9411] device_add_attrs+0x69/0x400 [ 1276.988260][ T9411] ? kobject_put+0xd8/0x160 [ 1276.992775][ T9411] device_add+0x431/0x8b0 [ 1276.997124][ T9411] netdev_register_kobject+0xfc/0x230 [ 1277.002531][ T9411] register_netdevice+0x86f/0xd60 [ 1277.007638][ T9411] ? mutex_lock+0xd/0x30 [ 1277.011946][ T9411] wg_newlink+0x3b2/0x580 [ 1277.016313][ T9411] ? wg_setup+0x1d0/0x1d0 [ 1277.020658][ T9411] rtnl_newlink+0xee5/0x1670 [ 1277.025333][ T9411] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1277.031630][ T9411] ? _raw_spin_unlock+0x26/0x40 [ 1277.036530][ T9411] ? __mutex_lock+0x21c/0x8d0 [ 1277.041247][ T9411] ? rtnl_setlink+0x300/0x300 [ 1277.045962][ T9411] rtnetlink_rcv_msg+0x807/0x8c0 [ 1277.050974][ T9411] ? memcg_list_lru_alloc+0xd5/0x750 [ 1277.056286][ T9411] ? mod_objcg_state+0x357/0x580 [ 1277.061290][ T9411] ? slab_post_alloc_hook+0x82/0x2f0 [ 1277.066599][ T9411] ? kmem_cache_free+0x1d9/0x380 [ 1277.071586][ T9411] ? __kfree_skb+0x104/0x140 [ 1277.076175][ T9411] ? nlmon_xmit+0x4b/0x60 [ 1277.080618][ T9411] ? __kfree_skb+0x104/0x140 [ 1277.085210][ T9411] ? consume_skb+0x57/0x180 [ 1277.089733][ T9411] ? nlmon_xmit+0x4b/0x60 [ 1277.094117][ T9411] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1277.099405][ T9411] ? __dev_queue_xmit+0xaae/0x1d80 [ 1277.104554][ T9411] ? ref_tracker_free+0x3a1/0x400 [ 1277.109587][ T9411] netlink_rcv_skb+0x126/0x220 [ 1277.114352][ T9411] ? rtnetlink_bind+0x60/0x60 [ 1277.119109][ T9411] rtnetlink_rcv+0x1c/0x20 [ 1277.123593][ T9411] netlink_unicast+0x589/0x650 [ 1277.128379][ T9411] netlink_sendmsg+0x66e/0x770 [ 1277.133151][ T9411] ? netlink_getsockopt+0x3e0/0x3e0 [ 1277.138409][ T9411] ____sys_sendmsg+0x37c/0x4d0 [ 1277.143188][ T9411] __sys_sendmsg+0x1e9/0x270 [ 1277.147833][ T9411] __x64_sys_sendmsg+0x46/0x50 [ 1277.152604][ T9411] do_syscall_64+0x44/0x110 [ 1277.157289][ T9411] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1277.163217][ T9411] RIP: 0033:0x7efd2e8d0ce9 [ 1277.167632][ T9411] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1277.187254][ T9411] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1277.195759][ T9411] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1277.203815][ T9411] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1277.211855][ T9411] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1277.219831][ T9411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1277.227829][ T9411] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1277.235900][ T9411] 03:20:02 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000020000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:02 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef002f00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1277.358461][ T9421] wireguard12: entered promiscuous mode [ 1277.364061][ T9421] wireguard12: entered allmulticast mode [ 1277.438269][ T9424] wireguard15: entered promiscuous mode [ 1277.443884][ T9424] wireguard15: entered allmulticast mode 03:20:02 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000030000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 61) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:02 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e1c95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:02 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef033000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1277.596372][ T9428] wireguard12: entered promiscuous mode [ 1277.601952][ T9428] wireguard12: entered allmulticast mode [ 1277.676827][ T9434] wireguard15: entered promiscuous mode [ 1277.682464][ T9434] wireguard15: entered allmulticast mode [ 1277.764241][ T9438] FAULT_INJECTION: forcing a failure. [ 1277.764241][ T9438] name failslab, interval 1, probability 0, space 0, times 0 [ 1277.777356][ T9438] CPU: 1 PID: 9438 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1277.787690][ T9438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1277.797923][ T9438] Call Trace: [ 1277.801273][ T9438] [ 1277.804198][ T9438] dump_stack_lvl+0xda/0x130 [ 1277.808801][ T9438] dump_stack+0x15/0x20 [ 1277.812983][ T9438] should_fail_ex+0x21f/0x230 [ 1277.817682][ T9438] ? __kernfs_new_node+0x6a/0x380 [ 1277.822822][ T9438] __should_failslab+0x92/0xa0 [ 1277.827609][ T9438] should_failslab+0x9/0x20 [ 1277.832140][ T9438] kmem_cache_alloc+0x4e/0x250 [ 1277.836943][ T9438] __kernfs_new_node+0x6a/0x380 [ 1277.841873][ T9438] ? rb_insert_color+0x6a/0x290 [ 1277.846743][ T9438] ? up_write+0x30/0xe0 [ 1277.850933][ T9438] ? kernfs_activate+0x252/0x270 [ 1277.855932][ T9438] kernfs_new_node+0x5f/0xd0 [ 1277.860615][ T9438] __kernfs_create_file+0x49/0x180 [ 1277.865813][ T9438] ? dev_attr_show+0x90/0x90 [ 1277.870404][ T9438] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1277.875788][ T9438] internal_create_group+0x2e4/0x800 [ 1277.881086][ T9438] sysfs_create_groups+0x3c/0xe0 [ 1277.886030][ T9438] device_add_attrs+0x69/0x400 [ 1277.890799][ T9438] ? kobject_put+0xd8/0x160 [ 1277.895443][ T9438] device_add+0x431/0x8b0 [ 1277.899836][ T9438] netdev_register_kobject+0xfc/0x230 [ 1277.905227][ T9438] register_netdevice+0x86f/0xd60 [ 1277.910308][ T9438] ? mutex_lock+0xd/0x30 [ 1277.914600][ T9438] wg_newlink+0x3b2/0x580 [ 1277.918981][ T9438] ? wg_setup+0x1d0/0x1d0 [ 1277.923317][ T9438] rtnl_newlink+0xee5/0x1670 [ 1277.927927][ T9438] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1277.934246][ T9438] ? _raw_spin_unlock+0x26/0x40 [ 1277.939096][ T9438] ? __mutex_lock+0x21c/0x8d0 [ 1277.943855][ T9438] ? rtnl_setlink+0x300/0x300 [ 1277.948550][ T9438] rtnetlink_rcv_msg+0x807/0x8c0 [ 1277.953562][ T9438] ? memcg_list_lru_alloc+0xd5/0x750 [ 1277.958918][ T9438] ? mod_objcg_state+0x357/0x580 03:20:03 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) (async) mlockall(0xa36128df7d60d922) [ 1277.963872][ T9438] ? slab_post_alloc_hook+0x82/0x2f0 [ 1277.969212][ T9438] ? kmem_cache_free+0x1d9/0x380 [ 1277.974155][ T9438] ? __kfree_skb+0x104/0x140 [ 1277.978744][ T9438] ? nlmon_xmit+0x4b/0x60 [ 1277.983078][ T9438] ? __kfree_skb+0x104/0x140 [ 1277.987672][ T9438] ? consume_skb+0x57/0x180 [ 1277.992229][ T9438] ? nlmon_xmit+0x4b/0x60 [ 1277.996707][ T9438] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1278.002009][ T9438] ? __dev_queue_xmit+0xaae/0x1d80 [ 1278.007126][ T9438] ? ref_tracker_free+0x3a1/0x400 [ 1278.012170][ T9438] netlink_rcv_skb+0x126/0x220 [ 1278.016937][ T9438] ? rtnetlink_bind+0x60/0x60 [ 1278.021614][ T9438] rtnetlink_rcv+0x1c/0x20 [ 1278.026115][ T9438] netlink_unicast+0x589/0x650 [ 1278.030900][ T9438] netlink_sendmsg+0x66e/0x770 [ 1278.035661][ T9438] ? netlink_getsockopt+0x3e0/0x3e0 [ 1278.040855][ T9438] ____sys_sendmsg+0x37c/0x4d0 [ 1278.045622][ T9438] __sys_sendmsg+0x1e9/0x270 [ 1278.050273][ T9438] __x64_sys_sendmsg+0x46/0x50 [ 1278.055107][ T9438] do_syscall_64+0x44/0x110 [ 1278.059659][ T9438] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1278.065573][ T9438] RIP: 0033:0x7efd2e8d0ce9 [ 1278.070054][ T9438] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1278.089670][ T9438] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1278.098087][ T9438] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1278.106090][ T9438] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1278.114057][ T9438] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1278.122105][ T9438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1278.130099][ T9438] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1278.138078][ T9438] 03:20:03 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x8000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:20:03 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000040000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:03 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef003200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:03 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x8000000, &(0x7f0000000000)="50e3d0f079c0802bdcf1339aa5df8e545b894253aedd1e9c7cd50f9ffd92dfe55675d6ded75a3152c0b5aa70abd72d51a2f0f1283acd6ddcad48ebfdf96f6acedc9963e5f750c2dfb231ba358a056c6c7eedceebeb1c9449cc0ef04df9dbadfc0a9fd1ff0596af390ad256fdfe0b42d32d12892dc7b0c7a55e9c2492f0a13654ae8eddf29ed4dc3e1c16955d604a13176ab1a07271bb", 0x96, 0x0, 0x0, &(0x7f00000000c0)="f3e7884cb1ac33f5b7cb2f919ebe08a1bd3ce578425b49b01f2a7dbaef967507ff488d8a599555bfadc1e17cf99d90cf1d7e510e7c71ef8f10f507464e9fc58b218597351f0090b5f0c66d7284e484526db848b5faad72fbd22792b319d59677c2699a920283d26bc8a4fb9687d0a26ec502ff7bf1b8b173336f73554b3adbe8a6652e2b7778e806d37df0c793f548f024e6eda2e53be9a3083a8506acc97ee024bd5101a38e78391d52a53eb705da54e930f3d64dba0d4e30fc42ee29d2ed78698f9e5334b77947ba3b6e7b45a614aec905dc5cc5f585d77df6e388b9ffac8a49dffd07859fe21bd904ac9c238eaa6e") [ 1278.284155][ T9451] wireguard15: entered promiscuous mode [ 1278.289751][ T9451] wireguard15: entered allmulticast mode [ 1278.339560][ T9450] wireguard12: entered promiscuous mode [ 1278.345192][ T9450] wireguard12: entered allmulticast mode 03:20:03 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484710af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 62) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:03 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef013600000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:03 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000050000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1278.513773][ T9466] wireguard15: entered promiscuous mode [ 1278.519381][ T9466] wireguard15: entered allmulticast mode [ 1278.605564][ T9470] wireguard12: entered promiscuous mode [ 1278.611160][ T9470] wireguard12: entered allmulticast mode [ 1278.643868][ T9471] FAULT_INJECTION: forcing a failure. [ 1278.643868][ T9471] name failslab, interval 1, probability 0, space 0, times 0 [ 1278.656603][ T9471] CPU: 1 PID: 9471 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1278.666949][ T9471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1278.677002][ T9471] Call Trace: [ 1278.680273][ T9471] [ 1278.683221][ T9471] dump_stack_lvl+0xda/0x130 [ 1278.687873][ T9471] dump_stack+0x15/0x20 [ 1278.692081][ T9471] should_fail_ex+0x21f/0x230 [ 1278.696898][ T9471] ? __kernfs_new_node+0x6a/0x380 [ 1278.701928][ T9471] __should_failslab+0x92/0xa0 [ 1278.706785][ T9471] should_failslab+0x9/0x20 [ 1278.711335][ T9471] kmem_cache_alloc+0x4e/0x250 [ 1278.716215][ T9471] __kernfs_new_node+0x6a/0x380 [ 1278.721066][ T9471] ? rb_insert_color+0x6a/0x290 [ 1278.725923][ T9471] ? up_write+0x30/0xe0 [ 1278.730076][ T9471] ? kernfs_activate+0x252/0x270 [ 1278.735098][ T9471] kernfs_new_node+0x5f/0xd0 [ 1278.739766][ T9471] __kernfs_create_file+0x49/0x180 [ 1278.744965][ T9471] ? dev_attr_show+0x90/0x90 [ 1278.749560][ T9471] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1278.754984][ T9471] internal_create_group+0x2e4/0x800 [ 1278.760276][ T9471] sysfs_create_groups+0x3c/0xe0 [ 1278.765223][ T9471] device_add_attrs+0x69/0x400 [ 1278.769999][ T9471] ? kobject_put+0xd8/0x160 [ 1278.774537][ T9471] device_add+0x431/0x8b0 [ 1278.778925][ T9471] netdev_register_kobject+0xfc/0x230 [ 1278.784371][ T9471] register_netdevice+0x86f/0xd60 [ 1278.789708][ T9471] ? mutex_lock+0xd/0x30 [ 1278.794001][ T9471] wg_newlink+0x3b2/0x580 [ 1278.798363][ T9471] ? wg_setup+0x1d0/0x1d0 [ 1278.802743][ T9471] rtnl_newlink+0xee5/0x1670 [ 1278.807362][ T9471] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1278.813634][ T9471] ? _raw_spin_unlock+0x26/0x40 [ 1278.818493][ T9471] ? __mutex_lock+0x21c/0x8d0 [ 1278.823184][ T9471] ? rtnl_setlink+0x300/0x300 [ 1278.827872][ T9471] rtnetlink_rcv_msg+0x807/0x8c0 [ 1278.832812][ T9471] ? memcg_list_lru_alloc+0xd5/0x750 [ 1278.838101][ T9471] ? mod_objcg_state+0x357/0x580 [ 1278.843030][ T9471] ? slab_post_alloc_hook+0x82/0x2f0 [ 1278.848431][ T9471] ? kmem_cache_free+0x1d9/0x380 [ 1278.853407][ T9471] ? __kfree_skb+0x104/0x140 [ 1278.857985][ T9471] ? nlmon_xmit+0x4b/0x60 [ 1278.862374][ T9471] ? __kfree_skb+0x104/0x140 [ 1278.866954][ T9471] ? consume_skb+0x57/0x180 [ 1278.871461][ T9471] ? nlmon_xmit+0x4b/0x60 [ 1278.875821][ T9471] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1278.881109][ T9471] ? __dev_queue_xmit+0xaae/0x1d80 [ 1278.886278][ T9471] ? ref_tracker_free+0x3a1/0x400 [ 1278.891299][ T9471] netlink_rcv_skb+0x126/0x220 [ 1278.896054][ T9471] ? rtnetlink_bind+0x60/0x60 [ 1278.900764][ T9471] rtnetlink_rcv+0x1c/0x20 [ 1278.905257][ T9471] netlink_unicast+0x589/0x650 [ 1278.910024][ T9471] netlink_sendmsg+0x66e/0x770 [ 1278.914789][ T9471] ? netlink_getsockopt+0x3e0/0x3e0 [ 1278.919976][ T9471] ____sys_sendmsg+0x37c/0x4d0 [ 1278.924788][ T9471] __sys_sendmsg+0x1e9/0x270 [ 1278.929382][ T9471] __x64_sys_sendmsg+0x46/0x50 [ 1278.934213][ T9471] do_syscall_64+0x44/0x110 [ 1278.938770][ T9471] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1278.944692][ T9471] RIP: 0033:0x7efd2e8d0ce9 [ 1278.949098][ T9471] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1278.968774][ T9471] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1278.977175][ T9471] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1278.985142][ T9471] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1278.993103][ T9471] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1279.001067][ T9471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1279.009118][ T9471] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1279.017088][ T9471] 03:20:04 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) (async) syz_clone(0x8000000, &(0x7f0000000000)="50e3d0f079c0802bdcf1339aa5df8e545b894253aedd1e9c7cd50f9ffd92dfe55675d6ded75a3152c0b5aa70abd72d51a2f0f1283acd6ddcad48ebfdf96f6acedc9963e5f750c2dfb231ba358a056c6c7eedceebeb1c9449cc0ef04df9dbadfc0a9fd1ff0596af390ad256fdfe0b42d32d12892dc7b0c7a55e9c2492f0a13654ae8eddf29ed4dc3e1c16955d604a13176ab1a07271bb", 0x96, 0x0, 0x0, &(0x7f00000000c0)="f3e7884cb1ac33f5b7cb2f919ebe08a1bd3ce578425b49b01f2a7dbaef967507ff488d8a599555bfadc1e17cf99d90cf1d7e510e7c71ef8f10f507464e9fc58b218597351f0090b5f0c66d7284e484526db848b5faad72fbd22792b319d59677c2699a920283d26bc8a4fb9687d0a26ec502ff7bf1b8b173336f73554b3adbe8a6652e2b7778e806d37df0c793f548f024e6eda2e53be9a3083a8506acc97ee024bd5101a38e78391d52a53eb705da54e930f3d64dba0d4e30fc42ee29d2ed78698f9e5334b77947ba3b6e7b45a614aec905dc5cc5f585d77df6e388b9ffac8a49dffd07859fe21bd904ac9c238eaa6e") 03:20:04 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef033800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:04 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000060000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:04 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484712af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1279.171799][ T9484] wireguard15: entered promiscuous mode [ 1279.177484][ T9484] wireguard15: entered allmulticast mode [ 1279.302233][ T9488] __nla_validate_parse: 18 callbacks suppressed [ 1279.302246][ T9488] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1279.380030][ T9488] wireguard12: entered promiscuous mode [ 1279.385654][ T9488] wireguard12: entered allmulticast mode 03:20:04 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x9000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:20:04 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 63) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:04 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef003900000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1279.477317][ T9498] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1279.549382][ T9498] wireguard15: entered promiscuous mode [ 1279.554992][ T9498] wireguard15: entered allmulticast mode [ 1279.634491][ T9499] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1279.643933][ T9499] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1279.657251][ T9499] wireguard20: entered promiscuous mode [ 1279.662951][ T9499] wireguard20: entered allmulticast mode 03:20:04 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000001060000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:04 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef003a00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1279.818916][ T9508] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1279.863756][ T9508] wireguard12: entered promiscuous mode [ 1279.869347][ T9508] wireguard12: entered allmulticast mode 03:20:05 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) syz_clone(0x8000000, &(0x7f0000000000)="50e3d0f079c0802bdcf1339aa5df8e545b894253aedd1e9c7cd50f9ffd92dfe55675d6ded75a3152c0b5aa70abd72d51a2f0f1283acd6ddcad48ebfdf96f6acedc9963e5f750c2dfb231ba358a056c6c7eedceebeb1c9449cc0ef04df9dbadfc0a9fd1ff0596af390ad256fdfe0b42d32d12892dc7b0c7a55e9c2492f0a13654ae8eddf29ed4dc3e1c16955d604a13176ab1a07271bb", 0x96, 0x0, 0x0, &(0x7f00000000c0)="f3e7884cb1ac33f5b7cb2f919ebe08a1bd3ce578425b49b01f2a7dbaef967507ff488d8a599555bfadc1e17cf99d90cf1d7e510e7c71ef8f10f507464e9fc58b218597351f0090b5f0c66d7284e484526db848b5faad72fbd22792b319d59677c2699a920283d26bc8a4fb9687d0a26ec502ff7bf1b8b173336f73554b3adbe8a6652e2b7778e806d37df0c793f548f024e6eda2e53be9a3083a8506acc97ee024bd5101a38e78391d52a53eb705da54e930f3d64dba0d4e30fc42ee29d2ed78698f9e5334b77947ba3b6e7b45a614aec905dc5cc5f585d77df6e388b9ffac8a49dffd07859fe21bd904ac9c238eaa6e") [ 1279.932766][ T9511] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1279.953549][ T9511] wireguard15: entered promiscuous mode [ 1279.959266][ T9511] wireguard15: entered allmulticast mode 03:20:05 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000070000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:05 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484722af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:05 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef003f00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1280.123914][ T9519] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1280.159441][ T9519] wireguard12: entered promiscuous mode [ 1280.165051][ T9519] wireguard12: entered allmulticast mode [ 1280.192411][ T9521] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:20:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 64) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1280.244639][ T9521] wireguard15: entered promiscuous mode [ 1280.250259][ T9521] wireguard15: entered allmulticast mode [ 1280.405454][ T9531] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1280.414792][ T9531] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1280.426475][ T9531] FAULT_INJECTION: forcing a failure. [ 1280.426475][ T9531] name failslab, interval 1, probability 0, space 0, times 0 [ 1280.439097][ T9531] CPU: 0 PID: 9531 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1280.449451][ T9531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1280.459547][ T9531] Call Trace: [ 1280.462894][ T9531] [ 1280.465824][ T9531] dump_stack_lvl+0xda/0x130 [ 1280.470442][ T9531] dump_stack+0x15/0x20 [ 1280.474685][ T9531] should_fail_ex+0x21f/0x230 [ 1280.479380][ T9531] ? __kernfs_new_node+0x6a/0x380 [ 1280.484511][ T9531] __should_failslab+0x92/0xa0 [ 1280.489290][ T9531] should_failslab+0x9/0x20 [ 1280.493808][ T9531] kmem_cache_alloc+0x4e/0x250 [ 1280.498591][ T9531] __kernfs_new_node+0x6a/0x380 [ 1280.503481][ T9531] ? rb_insert_color+0x6a/0x290 [ 1280.508419][ T9531] ? up_write+0x30/0xe0 [ 1280.512655][ T9531] ? kernfs_activate+0x252/0x270 [ 1280.517639][ T9531] kernfs_new_node+0x5f/0xd0 [ 1280.522313][ T9531] __kernfs_create_file+0x49/0x180 [ 1280.527465][ T9531] ? dev_attr_show+0x90/0x90 [ 1280.532058][ T9531] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1280.537457][ T9531] internal_create_group+0x2e4/0x800 [ 1280.542781][ T9531] sysfs_create_groups+0x3c/0xe0 [ 1280.547721][ T9531] device_add_attrs+0x69/0x400 03:20:05 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000080000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1280.552591][ T9531] ? kobject_put+0xd8/0x160 [ 1280.557219][ T9531] device_add+0x431/0x8b0 [ 1280.561569][ T9531] netdev_register_kobject+0xfc/0x230 [ 1280.566983][ T9531] register_netdevice+0x86f/0xd60 [ 1280.572024][ T9531] ? mutex_lock+0xd/0x30 [ 1280.576276][ T9531] wg_newlink+0x3b2/0x580 [ 1280.580745][ T9531] ? wg_setup+0x1d0/0x1d0 [ 1280.585089][ T9531] rtnl_newlink+0xee5/0x1670 [ 1280.589801][ T9531] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1280.596057][ T9531] ? _raw_spin_unlock+0x26/0x40 [ 1280.600967][ T9531] ? __mutex_lock+0x21c/0x8d0 [ 1280.605663][ T9531] ? rtnl_setlink+0x300/0x300 [ 1280.610357][ T9531] rtnetlink_rcv_msg+0x807/0x8c0 [ 1280.615300][ T9531] ? memcg_list_lru_alloc+0xd5/0x750 [ 1280.620730][ T9531] ? mod_objcg_state+0x357/0x580 [ 1280.625674][ T9531] ? slab_post_alloc_hook+0x82/0x2f0 [ 1280.631088][ T9531] ? kmem_cache_free+0x1d9/0x380 [ 1280.636034][ T9531] ? __kfree_skb+0x104/0x140 [ 1280.640643][ T9531] ? nlmon_xmit+0x4b/0x60 [ 1280.644971][ T9531] ? __kfree_skb+0x104/0x140 [ 1280.649561][ T9531] ? consume_skb+0x57/0x180 [ 1280.654066][ T9531] ? nlmon_xmit+0x4b/0x60 [ 1280.658468][ T9531] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1280.663763][ T9531] ? __dev_queue_xmit+0xaae/0x1d80 [ 1280.668882][ T9531] ? ref_tracker_free+0x3a1/0x400 [ 1280.674018][ T9531] netlink_rcv_skb+0x126/0x220 [ 1280.678777][ T9531] ? rtnetlink_bind+0x60/0x60 [ 1280.683459][ T9531] rtnetlink_rcv+0x1c/0x20 [ 1280.687876][ T9531] netlink_unicast+0x589/0x650 [ 1280.692731][ T9531] netlink_sendmsg+0x66e/0x770 [ 1280.697505][ T9531] ? netlink_getsockopt+0x3e0/0x3e0 [ 1280.702702][ T9531] ____sys_sendmsg+0x37c/0x4d0 [ 1280.707527][ T9531] __sys_sendmsg+0x1e9/0x270 [ 1280.712117][ T9531] __x64_sys_sendmsg+0x46/0x50 [ 1280.716926][ T9531] do_syscall_64+0x44/0x110 [ 1280.721444][ T9531] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1280.727345][ T9531] RIP: 0033:0x7efd2e8d0ce9 [ 1280.731762][ T9531] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1280.751416][ T9531] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1280.759825][ T9531] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1280.767813][ T9531] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1280.775782][ T9531] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1280.783875][ T9531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1280.791844][ T9531] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1280.799883][ T9531] 03:20:05 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef004000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1280.926025][ T9536] wireguard12: entered promiscuous mode [ 1280.931657][ T9536] wireguard12: entered allmulticast mode [ 1280.991613][ T9538] wireguard15: entered promiscuous mode [ 1280.997211][ T9538] wireguard15: entered allmulticast mode 03:20:06 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x10000200, 0x0, 0x0, 0x0) mlockall(0x0) 03:20:06 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x3000)=nil, 0x4000) shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ffb000/0x4000)=nil) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:20:06 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000090000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:06 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef024000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:06 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 65) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1281.437629][ T9548] wireguard12: entered promiscuous mode [ 1281.443347][ T9548] wireguard12: entered allmulticast mode [ 1281.481503][ T9552] FAULT_INJECTION: forcing a failure. [ 1281.481503][ T9552] name failslab, interval 1, probability 0, space 0, times 0 [ 1281.494140][ T9552] CPU: 1 PID: 9552 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1281.504541][ T9552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1281.514599][ T9552] Call Trace: [ 1281.517938][ T9552] [ 1281.520868][ T9552] dump_stack_lvl+0xda/0x130 [ 1281.525549][ T9552] dump_stack+0x15/0x20 [ 1281.529746][ T9552] should_fail_ex+0x21f/0x230 [ 1281.534513][ T9552] ? __kernfs_new_node+0x6a/0x380 [ 1281.539538][ T9552] __should_failslab+0x92/0xa0 [ 1281.544323][ T9552] should_failslab+0x9/0x20 [ 1281.548842][ T9552] kmem_cache_alloc+0x4e/0x250 [ 1281.553615][ T9552] __kernfs_new_node+0x6a/0x380 [ 1281.558504][ T9552] ? rb_insert_color+0x6a/0x290 [ 1281.563372][ T9552] ? up_write+0x30/0xe0 [ 1281.567530][ T9552] ? kernfs_activate+0x252/0x270 [ 1281.572485][ T9552] kernfs_new_node+0x5f/0xd0 [ 1281.577086][ T9552] __kernfs_create_file+0x49/0x180 [ 1281.582251][ T9552] ? dev_attr_show+0x90/0x90 [ 1281.586846][ T9552] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1281.592237][ T9552] internal_create_group+0x2e4/0x800 [ 1281.597595][ T9552] sysfs_create_groups+0x3c/0xe0 [ 1281.602563][ T9552] device_add_attrs+0x69/0x400 [ 1281.607334][ T9552] ? kobject_put+0xd8/0x160 [ 1281.611847][ T9552] device_add+0x431/0x8b0 [ 1281.616259][ T9552] netdev_register_kobject+0xfc/0x230 [ 1281.621724][ T9552] register_netdevice+0x86f/0xd60 [ 1281.626760][ T9552] ? mutex_lock+0xd/0x30 [ 1281.631083][ T9552] wg_newlink+0x3b2/0x580 [ 1281.635422][ T9552] ? wg_setup+0x1d0/0x1d0 [ 1281.639757][ T9552] rtnl_newlink+0xee5/0x1670 [ 1281.644494][ T9552] ? __mutex_lock+0x54/0x8d0 [ 1281.649131][ T9552] ? rtnl_setlink+0x300/0x300 [ 1281.653891][ T9552] rtnetlink_rcv_msg+0x807/0x8c0 [ 1281.658923][ T9552] ? memcg_list_lru_alloc+0xd5/0x750 [ 1281.664268][ T9552] ? mod_objcg_state+0x357/0x580 [ 1281.669265][ T9552] ? slab_post_alloc_hook+0x82/0x2f0 [ 1281.674559][ T9552] ? kmem_cache_free+0x1d9/0x380 [ 1281.679565][ T9552] ? __kfree_skb+0x104/0x140 [ 1281.684152][ T9552] ? nlmon_xmit+0x4b/0x60 [ 1281.688481][ T9552] ? __kfree_skb+0x104/0x140 [ 1281.693181][ T9552] ? consume_skb+0x57/0x180 [ 1281.697676][ T9552] ? nlmon_xmit+0x4b/0x60 [ 1281.702023][ T9552] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1281.707381][ T9552] ? __dev_queue_xmit+0xaae/0x1d80 [ 1281.712501][ T9552] ? ref_tracker_free+0x3a1/0x400 [ 1281.717534][ T9552] netlink_rcv_skb+0x126/0x220 [ 1281.722304][ T9552] ? rtnetlink_bind+0x60/0x60 [ 1281.727065][ T9552] rtnetlink_rcv+0x1c/0x20 [ 1281.731490][ T9552] netlink_unicast+0x589/0x650 [ 1281.736316][ T9552] netlink_sendmsg+0x66e/0x770 [ 1281.741090][ T9552] ? netlink_getsockopt+0x3e0/0x3e0 [ 1281.746371][ T9552] ____sys_sendmsg+0x37c/0x4d0 [ 1281.751676][ T9552] __sys_sendmsg+0x1e9/0x270 [ 1281.756336][ T9552] __x64_sys_sendmsg+0x46/0x50 [ 1281.761104][ T9552] do_syscall_64+0x44/0x110 [ 1281.765618][ T9552] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1281.771517][ T9552] RIP: 0033:0x7efd2e8d0ce9 [ 1281.775999][ T9552] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1281.795629][ T9552] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1281.804047][ T9552] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1281.812063][ T9552] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1281.820038][ T9552] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1281.828007][ T9552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1281.835972][ T9552] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1281.843950][ T9552] [ 1281.860758][ T9550] wireguard15: entered promiscuous mode [ 1281.866368][ T9550] wireguard15: entered allmulticast mode 03:20:07 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000000a0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:07 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef004400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1282.076083][ T9566] wireguard12: entered promiscuous mode [ 1282.081671][ T9566] wireguard12: entered allmulticast mode [ 1282.174903][ T9569] wireguard15: entered promiscuous mode [ 1282.180518][ T9569] wireguard15: entered allmulticast mode 03:20:07 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484726af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:07 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 66) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:07 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000000b0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:07 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef014400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1282.764979][ T9576] wireguard15: entered promiscuous mode [ 1282.770609][ T9576] wireguard15: entered allmulticast mode [ 1282.810733][ T9577] wireguard12: entered promiscuous mode [ 1282.816420][ T9577] wireguard12: entered allmulticast mode 03:20:08 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x11000000, 0x0, 0x0, 0x0) mlockall(0x0) [ 1282.867824][ T9579] FAULT_INJECTION: forcing a failure. [ 1282.867824][ T9579] name failslab, interval 1, probability 0, space 0, times 0 [ 1282.880514][ T9579] CPU: 0 PID: 9579 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1282.890858][ T9579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1282.900912][ T9579] Call Trace: [ 1282.904194][ T9579] [ 1282.907125][ T9579] dump_stack_lvl+0xda/0x130 [ 1282.911757][ T9579] dump_stack+0x15/0x20 [ 1282.915995][ T9579] should_fail_ex+0x21f/0x230 [ 1282.920688][ T9579] ? __kernfs_new_node+0x6a/0x380 [ 1282.925713][ T9579] __should_failslab+0x92/0xa0 [ 1282.930504][ T9579] should_failslab+0x9/0x20 [ 1282.935016][ T9579] kmem_cache_alloc+0x4e/0x250 [ 1282.939843][ T9579] __kernfs_new_node+0x6a/0x380 [ 1282.944706][ T9579] ? rb_insert_color+0x6a/0x290 [ 1282.949648][ T9579] ? up_write+0x30/0xe0 [ 1282.953809][ T9579] ? kernfs_activate+0x252/0x270 [ 1282.958758][ T9579] kernfs_new_node+0x5f/0xd0 [ 1282.963436][ T9579] __kernfs_create_file+0x49/0x180 [ 1282.968628][ T9579] ? dev_attr_show+0x90/0x90 [ 1282.973227][ T9579] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1282.978601][ T9579] internal_create_group+0x2e4/0x800 [ 1282.983890][ T9579] sysfs_create_groups+0x3c/0xe0 [ 1282.988836][ T9579] device_add_attrs+0x69/0x400 [ 1282.993675][ T9579] ? kobject_put+0xd8/0x160 [ 1282.998258][ T9579] device_add+0x431/0x8b0 [ 1283.002663][ T9579] netdev_register_kobject+0xfc/0x230 [ 1283.008118][ T9579] register_netdevice+0x86f/0xd60 [ 1283.013253][ T9579] ? mutex_lock+0xd/0x30 [ 1283.017502][ T9579] wg_newlink+0x3b2/0x580 [ 1283.021852][ T9579] ? wg_setup+0x1d0/0x1d0 [ 1283.026183][ T9579] rtnl_newlink+0xee5/0x1670 [ 1283.030862][ T9579] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1283.037137][ T9579] ? _raw_spin_unlock+0x26/0x40 [ 1283.042069][ T9579] ? __mutex_lock+0x21c/0x8d0 [ 1283.046836][ T9579] ? rtnl_setlink+0x300/0x300 [ 1283.051537][ T9579] rtnetlink_rcv_msg+0x807/0x8c0 [ 1283.056484][ T9579] ? memcg_list_lru_alloc+0xd5/0x750 [ 1283.061838][ T9579] ? mod_objcg_state+0x357/0x580 [ 1283.066820][ T9579] ? slab_post_alloc_hook+0x82/0x2f0 [ 1283.072119][ T9579] ? kmem_cache_free+0x1d9/0x380 [ 1283.077093][ T9579] ? __kfree_skb+0x104/0x140 [ 1283.081730][ T9579] ? nlmon_xmit+0x4b/0x60 [ 1283.086083][ T9579] ? __kfree_skb+0x104/0x140 [ 1283.090761][ T9579] ? consume_skb+0x57/0x180 [ 1283.095267][ T9579] ? nlmon_xmit+0x4b/0x60 [ 1283.099609][ T9579] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1283.105001][ T9579] ? __dev_queue_xmit+0xaae/0x1d80 [ 1283.110125][ T9579] ? ref_tracker_free+0x3a1/0x400 [ 1283.115169][ T9579] netlink_rcv_skb+0x126/0x220 [ 1283.119945][ T9579] ? rtnetlink_bind+0x60/0x60 [ 1283.124632][ T9579] rtnetlink_rcv+0x1c/0x20 [ 1283.129048][ T9579] netlink_unicast+0x589/0x650 [ 1283.133913][ T9579] netlink_sendmsg+0x66e/0x770 [ 1283.138728][ T9579] ? netlink_getsockopt+0x3e0/0x3e0 [ 1283.143928][ T9579] ____sys_sendmsg+0x37c/0x4d0 [ 1283.148704][ T9579] __sys_sendmsg+0x1e9/0x270 [ 1283.153375][ T9579] __x64_sys_sendmsg+0x46/0x50 [ 1283.158145][ T9579] do_syscall_64+0x44/0x110 [ 1283.162712][ T9579] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1283.168752][ T9579] RIP: 0033:0x7efd2e8d0ce9 [ 1283.173597][ T9579] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1283.193220][ T9579] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1283.201648][ T9579] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1283.209620][ T9579] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1283.217618][ T9579] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1283.225592][ T9579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1283.233634][ T9579] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1283.241639][ T9579] 03:20:08 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef884700000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1283.330126][ T9594] wireguard15: entered promiscuous mode [ 1283.335727][ T9594] wireguard15: entered allmulticast mode 03:20:08 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) (async, rerun: 32) shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x3000)=nil, 0x4000) (rerun: 32) shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ffb000/0x4000)=nil) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:20:08 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000000c0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:08 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefee4700000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:08 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484763af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 67) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1283.656216][ T9599] wireguard12: entered promiscuous mode [ 1283.661906][ T9599] wireguard12: entered allmulticast mode [ 1283.776637][ T9604] wireguard15: entered promiscuous mode [ 1283.782452][ T9604] wireguard15: entered allmulticast mode [ 1283.843354][ T9609] wireguard21: entered promiscuous mode [ 1283.849139][ T9609] wireguard21: entered allmulticast mode 03:20:09 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000010c0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:09 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef004800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1283.959110][ T9619] wireguard12: entered promiscuous mode [ 1283.964750][ T9619] wireguard12: entered allmulticast mode [ 1284.000705][ T9623] wireguard15: entered promiscuous mode [ 1284.006322][ T9623] wireguard15: entered allmulticast mode 03:20:09 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484766af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:09 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000000d0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:09 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef884800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1284.187801][ T9631] wireguard12: entered promiscuous mode [ 1284.193383][ T9631] wireguard12: entered allmulticast mode 03:20:09 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x12010000, 0x0, 0x0, 0x0) mlockall(0x0) [ 1284.292462][ T9634] wireguard15: entered promiscuous mode [ 1284.298115][ T9634] wireguard15: entered allmulticast mode 03:20:09 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000000e0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1284.438732][ T9642] __nla_validate_parse: 21 callbacks suppressed [ 1284.438746][ T9642] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1284.493459][ T9642] wireguard12: entered promiscuous mode [ 1284.499096][ T9642] wireguard12: entered allmulticast mode 03:20:10 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) (async) shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x3000)=nil, 0x4000) (async) shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ffb000/0x4000)=nil) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:20:10 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef004c00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 68) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:10 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484770af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:10 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000030e0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1284.968274][ T9648] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1285.013098][ T9648] wireguard15: entered promiscuous mode [ 1285.018831][ T9648] wireguard15: entered allmulticast mode [ 1285.091397][ T9650] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1285.122684][ T9650] wireguard12: entered promiscuous mode [ 1285.128386][ T9650] wireguard12: entered allmulticast mode [ 1285.228644][ T9652] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1285.237896][ T9652] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1285.248855][ T9652] FAULT_INJECTION: forcing a failure. [ 1285.248855][ T9652] name failslab, interval 1, probability 0, space 0, times 0 [ 1285.261518][ T9652] CPU: 0 PID: 9652 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1285.271879][ T9652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1285.282003][ T9652] Call Trace: [ 1285.285306][ T9652] [ 1285.288243][ T9652] dump_stack_lvl+0xda/0x130 [ 1285.292911][ T9652] dump_stack+0x15/0x20 [ 1285.297080][ T9652] should_fail_ex+0x21f/0x230 [ 1285.301770][ T9652] ? __kernfs_new_node+0x6a/0x380 [ 1285.306801][ T9652] __should_failslab+0x92/0xa0 [ 1285.311660][ T9652] should_failslab+0x9/0x20 [ 1285.316170][ T9652] kmem_cache_alloc+0x4e/0x250 [ 1285.320980][ T9652] __kernfs_new_node+0x6a/0x380 [ 1285.325894][ T9652] ? rb_insert_color+0x6a/0x290 [ 1285.330749][ T9652] ? up_write+0x30/0xe0 [ 1285.334946][ T9652] ? kernfs_activate+0x252/0x270 [ 1285.339925][ T9652] kernfs_new_node+0x5f/0xd0 [ 1285.344588][ T9652] __kernfs_create_file+0x49/0x180 [ 1285.349716][ T9652] ? dev_attr_show+0x90/0x90 [ 1285.354314][ T9652] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1285.359736][ T9652] internal_create_group+0x2e4/0x800 [ 1285.365072][ T9652] sysfs_create_groups+0x3c/0xe0 [ 1285.370053][ T9652] device_add_attrs+0x69/0x400 [ 1285.374830][ T9652] ? kobject_put+0xd8/0x160 [ 1285.379333][ T9652] device_add+0x431/0x8b0 [ 1285.383736][ T9652] netdev_register_kobject+0xfc/0x230 [ 1285.389116][ T9652] register_netdevice+0x86f/0xd60 [ 1285.394160][ T9652] ? mutex_lock+0xd/0x30 [ 1285.398409][ T9652] wg_newlink+0x3b2/0x580 [ 1285.402748][ T9652] ? wg_setup+0x1d0/0x1d0 [ 1285.407102][ T9652] rtnl_newlink+0xee5/0x1670 [ 1285.411817][ T9652] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1285.418094][ T9652] ? _raw_spin_unlock+0x26/0x40 [ 1285.422976][ T9652] ? __mutex_lock+0x21c/0x8d0 [ 1285.427688][ T9652] ? rtnl_setlink+0x300/0x300 [ 1285.432478][ T9652] rtnetlink_rcv_msg+0x807/0x8c0 [ 1285.437415][ T9652] ? memcg_list_lru_alloc+0xd5/0x750 [ 1285.442821][ T9652] ? mod_objcg_state+0x357/0x580 [ 1285.447853][ T9652] ? slab_post_alloc_hook+0x82/0x2f0 [ 1285.453226][ T9652] ? kmem_cache_free+0x1d9/0x380 [ 1285.458273][ T9652] ? __kfree_skb+0x104/0x140 [ 1285.462863][ T9652] ? nlmon_xmit+0x4b/0x60 [ 1285.467258][ T9652] ? __kfree_skb+0x104/0x140 [ 1285.471886][ T9652] ? consume_skb+0x57/0x180 [ 1285.476398][ T9652] ? nlmon_xmit+0x4b/0x60 [ 1285.480737][ T9652] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1285.486105][ T9652] ? __dev_queue_xmit+0xaae/0x1d80 [ 1285.491226][ T9652] ? ref_tracker_free+0x3a1/0x400 [ 1285.496261][ T9652] netlink_rcv_skb+0x126/0x220 [ 1285.501025][ T9652] ? rtnetlink_bind+0x60/0x60 [ 1285.505752][ T9652] rtnetlink_rcv+0x1c/0x20 [ 1285.510223][ T9652] netlink_unicast+0x589/0x650 [ 1285.515006][ T9652] netlink_sendmsg+0x66e/0x770 [ 1285.519772][ T9652] ? netlink_getsockopt+0x3e0/0x3e0 [ 1285.524984][ T9652] ____sys_sendmsg+0x37c/0x4d0 [ 1285.529766][ T9652] __sys_sendmsg+0x1e9/0x270 [ 1285.534369][ T9652] __x64_sys_sendmsg+0x46/0x50 [ 1285.539249][ T9652] do_syscall_64+0x44/0x110 [ 1285.543782][ T9652] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1285.549687][ T9652] RIP: 0033:0x7efd2e8d0ce9 [ 1285.554106][ T9652] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1285.573816][ T9652] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1285.582249][ T9652] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1285.590250][ T9652] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1285.598215][ T9652] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1285.606195][ T9652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1285.614168][ T9652] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1285.622174][ T9652] 03:20:10 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000000f0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:10 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef005000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:10 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x15020000, 0x0, 0x0, 0x0) mlockall(0x0) 03:20:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 69) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1285.720788][ T9668] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1285.746032][ T9668] wireguard12: entered promiscuous mode [ 1285.751669][ T9668] wireguard12: entered allmulticast mode [ 1285.797511][ T9670] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1285.848301][ T9670] wireguard15: entered promiscuous mode [ 1285.853931][ T9670] wireguard15: entered allmulticast mode [ 1285.907524][ T9679] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1285.916761][ T9679] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1285.926768][ T9679] FAULT_INJECTION: forcing a failure. [ 1285.926768][ T9679] name failslab, interval 1, probability 0, space 0, times 0 [ 1285.939427][ T9679] CPU: 1 PID: 9679 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1285.949758][ T9679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1285.959849][ T9679] Call Trace: [ 1285.963130][ T9679] [ 1285.966058][ T9679] dump_stack_lvl+0xda/0x130 [ 1285.970708][ T9679] dump_stack+0x15/0x20 [ 1285.974874][ T9679] should_fail_ex+0x21f/0x230 [ 1285.979592][ T9679] ? __kernfs_new_node+0x6a/0x380 [ 1285.984621][ T9679] __should_failslab+0x92/0xa0 [ 1285.989398][ T9679] should_failslab+0x9/0x20 [ 1285.993981][ T9679] kmem_cache_alloc+0x4e/0x250 [ 1285.998884][ T9679] __kernfs_new_node+0x6a/0x380 [ 1286.003762][ T9679] ? rb_insert_color+0x263/0x290 [ 1286.008712][ T9679] ? up_write+0x30/0xe0 [ 1286.012869][ T9679] ? kernfs_activate+0x252/0x270 [ 1286.017813][ T9679] kernfs_new_node+0x5f/0xd0 [ 1286.022406][ T9679] __kernfs_create_file+0x49/0x180 [ 1286.027523][ T9679] ? dev_attr_show+0x90/0x90 [ 1286.032116][ T9679] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1286.037497][ T9679] internal_create_group+0x2e4/0x800 [ 1286.042831][ T9679] sysfs_create_groups+0x3c/0xe0 [ 1286.047839][ T9679] device_add_attrs+0x69/0x400 [ 1286.052673][ T9679] ? kobject_put+0xd8/0x160 [ 1286.057191][ T9679] device_add+0x431/0x8b0 [ 1286.061676][ T9679] netdev_register_kobject+0xfc/0x230 [ 1286.067058][ T9679] register_netdevice+0x86f/0xd60 [ 1286.072112][ T9679] ? mutex_lock+0xd/0x30 [ 1286.076435][ T9679] wg_newlink+0x3b2/0x580 [ 1286.080877][ T9679] ? wg_setup+0x1d0/0x1d0 [ 1286.085224][ T9679] rtnl_newlink+0xee5/0x1670 [ 1286.089830][ T9679] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1286.096120][ T9679] ? _raw_spin_unlock+0x26/0x40 [ 1286.101169][ T9679] ? __mutex_lock+0x21c/0x8d0 [ 1286.105856][ T9679] ? rtnl_setlink+0x300/0x300 [ 1286.110542][ T9679] rtnetlink_rcv_msg+0x807/0x8c0 [ 1286.115487][ T9679] ? memcg_list_lru_alloc+0xd5/0x750 [ 1286.120790][ T9679] ? mod_objcg_state+0x357/0x580 [ 1286.125822][ T9679] ? slab_post_alloc_hook+0x82/0x2f0 [ 1286.131132][ T9679] ? kmem_cache_free+0x1d9/0x380 [ 1286.136125][ T9679] ? __kfree_skb+0x104/0x140 [ 1286.140790][ T9679] ? nlmon_xmit+0x4b/0x60 [ 1286.145128][ T9679] ? __kfree_skb+0x104/0x140 [ 1286.149714][ T9679] ? consume_skb+0x57/0x180 [ 1286.154222][ T9679] ? nlmon_xmit+0x4b/0x60 [ 1286.158554][ T9679] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1286.163854][ T9679] ? __dev_queue_xmit+0xaae/0x1d80 [ 1286.169048][ T9679] ? ref_tracker_free+0x3a1/0x400 [ 1286.174077][ T9679] netlink_rcv_skb+0x126/0x220 [ 1286.178885][ T9679] ? rtnetlink_bind+0x60/0x60 [ 1286.183575][ T9679] rtnetlink_rcv+0x1c/0x20 [ 1286.187992][ T9679] netlink_unicast+0x589/0x650 [ 1286.192877][ T9679] netlink_sendmsg+0x66e/0x770 [ 1286.197639][ T9679] ? netlink_getsockopt+0x3e0/0x3e0 [ 1286.202910][ T9679] ____sys_sendmsg+0x37c/0x4d0 [ 1286.207675][ T9679] __sys_sendmsg+0x1e9/0x270 [ 1286.212360][ T9679] __x64_sys_sendmsg+0x46/0x50 [ 1286.217131][ T9679] do_syscall_64+0x44/0x110 [ 1286.221709][ T9679] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1286.227609][ T9679] RIP: 0033:0x7efd2e8d0ce9 [ 1286.232040][ T9679] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 03:20:11 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f954847c6af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1286.251661][ T9679] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1286.260147][ T9679] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1286.268118][ T9679] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1286.276094][ T9679] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1286.284141][ T9679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1286.292146][ T9679] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1286.300243][ T9679] 03:20:11 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000020f0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:11 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef025400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1286.412743][ T9685] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1286.426368][ T9685] wireguard12: entered promiscuous mode [ 1286.431946][ T9685] wireguard12: entered allmulticast mode [ 1286.493907][ T9687] wireguard15: entered promiscuous mode [ 1286.499492][ T9687] wireguard15: entered allmulticast mode 03:20:12 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000100000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:12 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 70) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:12 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef655800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:12 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f954847fbaf3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:12 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/bus/input/devices\x00', 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) r1 = syz_clone3(&(0x7f0000000380)={0x300004000, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000480), {0x16}, &(0x7f0000000200)=""/170, 0xaa, &(0x7f00000004c0)=""/88, &(0x7f0000000340)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x1, {r0}}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000540)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x8a, 0x0, 0x0) r4 = accept$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r5, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty, 0x80000}, @nfc={0x27, 0x0, 0x1, 0x6}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x0, 0x0, 0x114}) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)={0x50, r6, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xb}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}]}]}, 0x50}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f00000003c0)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001840)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000840)={{r4}, r8, 0x3, @unused=[0x7, 0xb55e, 0x2, 0x5], @devid=r9}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f00000006c0)={{r3}, r8, 0x4, @unused=[0xe2b, 0x4, 0x3, 0x4b4b], @subvolid=0x796}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r10, 0x10f, 0x8a, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, r0, &(0x7f0000000440)={r2, r10, 0x5}) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) mlockall(0x5) syz_clone(0x54002100, &(0x7f0000000000)="5906000000f0f2330e618f503d4fc3516b96d69928b5deb598b93940a5c9b524143ea1f1b2ec5fd4aa1aca0c7f8f7c6f84e72467845adf2a9e6571a8b8cdc12291101260ca1443ef8ab2f6b55eead6708bffb023d0ba8c7b87851b0951", 0x5d, 0x0, 0x0, &(0x7f0000000080)="4f4a1207161f0253077cba772434045b70cfa65cc2a5fddfe17a74976531752ff05c4eb38cc05a0a9d98bf8a4982669848ae1446fe263abd5180ead58e5279bfd15481c15485791a70662e110c7600"/88) [ 1286.930973][ T9700] wireguard15: entered promiscuous mode [ 1286.936642][ T9700] wireguard15: entered allmulticast mode [ 1287.006693][ T9697] wireguard12: entered promiscuous mode [ 1287.012267][ T9697] wireguard12: entered allmulticast mode [ 1287.068117][ T9707] FAULT_INJECTION: forcing a failure. [ 1287.068117][ T9707] name failslab, interval 1, probability 0, space 0, times 0 [ 1287.080811][ T9707] CPU: 1 PID: 9707 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1287.091138][ T9707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1287.101197][ T9707] Call Trace: [ 1287.104478][ T9707] [ 1287.107413][ T9707] dump_stack_lvl+0xda/0x130 [ 1287.112417][ T9707] dump_stack+0x15/0x20 [ 1287.116579][ T9707] should_fail_ex+0x21f/0x230 [ 1287.121333][ T9707] ? __kernfs_new_node+0x6a/0x380 [ 1287.126436][ T9707] __should_failslab+0x92/0xa0 [ 1287.131215][ T9707] should_failslab+0x9/0x20 [ 1287.136146][ T9707] kmem_cache_alloc+0x4e/0x250 [ 1287.140990][ T9707] __kernfs_new_node+0x6a/0x380 [ 1287.145836][ T9707] ? rb_insert_color+0x6a/0x290 [ 1287.150722][ T9707] ? up_write+0x30/0xe0 [ 1287.154939][ T9707] ? kernfs_activate+0x252/0x270 [ 1287.159910][ T9707] kernfs_new_node+0x5f/0xd0 [ 1287.164532][ T9707] __kernfs_create_file+0x49/0x180 [ 1287.169707][ T9707] ? dev_attr_show+0x90/0x90 [ 1287.174303][ T9707] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1287.179723][ T9707] internal_create_group+0x2e4/0x800 [ 1287.185053][ T9707] sysfs_create_groups+0x3c/0xe0 [ 1287.190054][ T9707] device_add_attrs+0x69/0x400 [ 1287.195260][ T9707] ? kobject_put+0xd8/0x160 [ 1287.199852][ T9707] device_add+0x431/0x8b0 [ 1287.204235][ T9707] netdev_register_kobject+0xfc/0x230 [ 1287.209735][ T9707] register_netdevice+0x86f/0xd60 [ 1287.214948][ T9707] ? mutex_lock+0xd/0x30 [ 1287.219233][ T9707] wg_newlink+0x3b2/0x580 [ 1287.223632][ T9707] ? wg_setup+0x1d0/0x1d0 [ 1287.228035][ T9707] rtnl_newlink+0xee5/0x1670 [ 1287.232827][ T9707] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1287.239170][ T9707] ? _raw_spin_unlock+0x26/0x40 [ 1287.244051][ T9707] ? __mutex_lock+0x21c/0x8d0 [ 1287.248755][ T9707] ? rtnl_setlink+0x300/0x300 [ 1287.253537][ T9707] rtnetlink_rcv_msg+0x807/0x8c0 [ 1287.258484][ T9707] ? memcg_list_lru_alloc+0xd5/0x750 [ 1287.263875][ T9707] ? mod_objcg_state+0x357/0x580 [ 1287.268822][ T9707] ? slab_post_alloc_hook+0x82/0x2f0 [ 1287.274152][ T9707] ? kmem_cache_free+0x1d9/0x380 [ 1287.279100][ T9707] ? __kfree_skb+0x104/0x140 [ 1287.283693][ T9707] ? nlmon_xmit+0x4b/0x60 [ 1287.288032][ T9707] ? __kfree_skb+0x104/0x140 [ 1287.292619][ T9707] ? consume_skb+0x57/0x180 [ 1287.297202][ T9707] ? nlmon_xmit+0x4b/0x60 [ 1287.301541][ T9707] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1287.306839][ T9707] ? __dev_queue_xmit+0xaae/0x1d80 [ 1287.311960][ T9707] ? ref_tracker_free+0x3a1/0x400 [ 1287.316989][ T9707] netlink_rcv_skb+0x126/0x220 [ 1287.321754][ T9707] ? rtnetlink_bind+0x60/0x60 [ 1287.326458][ T9707] rtnetlink_rcv+0x1c/0x20 [ 1287.330893][ T9707] netlink_unicast+0x589/0x650 [ 1287.335736][ T9707] netlink_sendmsg+0x66e/0x770 [ 1287.340538][ T9707] ? netlink_getsockopt+0x3e0/0x3e0 [ 1287.345785][ T9707] ____sys_sendmsg+0x37c/0x4d0 [ 1287.350661][ T9707] __sys_sendmsg+0x1e9/0x270 [ 1287.355255][ T9707] __x64_sys_sendmsg+0x46/0x50 [ 1287.360098][ T9707] do_syscall_64+0x44/0x110 [ 1287.364717][ T9707] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1287.370622][ T9707] RIP: 0033:0x7efd2e8d0ce9 [ 1287.375033][ T9707] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1287.394675][ T9707] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1287.403090][ T9707] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1287.411057][ T9707] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 03:20:12 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x1d000000, 0x0, 0x0, 0x0) mlockall(0x0) [ 1287.419025][ T9707] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1287.427036][ T9707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1287.435007][ T9707] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1287.442980][ T9707] 03:20:12 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000110000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:12 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef006000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1287.550414][ T9716] wireguard12: entered promiscuous mode [ 1287.556015][ T9716] wireguard12: entered allmulticast mode [ 1287.620350][ T9719] wireguard15: entered promiscuous mode [ 1287.625962][ T9719] wireguard15: entered allmulticast mode 03:20:12 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000120000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:12 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 71) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:12 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef016200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1287.780929][ T9725] wireguard12: entered promiscuous mode [ 1287.786729][ T9725] wireguard12: entered allmulticast mode [ 1287.913732][ T9731] wireguard15: entered promiscuous mode [ 1287.919359][ T9731] wireguard15: entered allmulticast mode [ 1287.966149][ T9733] FAULT_INJECTION: forcing a failure. [ 1287.966149][ T9733] name failslab, interval 1, probability 0, space 0, times 0 [ 1287.978961][ T9733] CPU: 1 PID: 9733 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1287.989326][ T9733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1287.999436][ T9733] Call Trace: [ 1288.002717][ T9733] [ 1288.005649][ T9733] dump_stack_lvl+0xda/0x130 [ 1288.010263][ T9733] dump_stack+0x15/0x20 [ 1288.014560][ T9733] should_fail_ex+0x21f/0x230 [ 1288.019333][ T9733] ? __kernfs_new_node+0x6a/0x380 [ 1288.024367][ T9733] __should_failslab+0x92/0xa0 [ 1288.029153][ T9733] should_failslab+0x9/0x20 [ 1288.033662][ T9733] kmem_cache_alloc+0x4e/0x250 [ 1288.038495][ T9733] __kernfs_new_node+0x6a/0x380 [ 1288.043356][ T9733] ? rb_insert_color+0x263/0x290 [ 1288.048384][ T9733] ? up_write+0x30/0xe0 [ 1288.052589][ T9733] ? kernfs_activate+0x252/0x270 [ 1288.057540][ T9733] kernfs_new_node+0x5f/0xd0 [ 1288.062137][ T9733] __kernfs_create_file+0x49/0x180 [ 1288.067307][ T9733] ? dev_attr_show+0x90/0x90 [ 1288.071898][ T9733] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1288.077285][ T9733] internal_create_group+0x2e4/0x800 [ 1288.082648][ T9733] sysfs_create_groups+0x3c/0xe0 [ 1288.087602][ T9733] device_add_attrs+0x69/0x400 [ 1288.092395][ T9733] ? kobject_put+0xd8/0x160 [ 1288.096931][ T9733] device_add+0x431/0x8b0 [ 1288.101382][ T9733] netdev_register_kobject+0xfc/0x230 [ 1288.106814][ T9733] register_netdevice+0x86f/0xd60 [ 1288.111862][ T9733] ? mutex_lock+0xd/0x30 [ 1288.116126][ T9733] wg_newlink+0x3b2/0x580 [ 1288.120499][ T9733] ? wg_setup+0x1d0/0x1d0 [ 1288.124830][ T9733] rtnl_newlink+0xee5/0x1670 [ 1288.129478][ T9733] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1288.135809][ T9733] ? _raw_spin_unlock+0x26/0x40 [ 1288.140747][ T9733] ? __mutex_lock+0x21c/0x8d0 [ 1288.145434][ T9733] ? rtnl_setlink+0x300/0x300 [ 1288.150179][ T9733] rtnetlink_rcv_msg+0x807/0x8c0 [ 1288.155181][ T9733] ? __rcu_read_unlock+0x4d/0x70 [ 1288.160165][ T9733] ? __rcu_read_unlock+0x4d/0x70 [ 1288.165117][ T9733] ? __refill_stock+0x7f/0xb0 [ 1288.169868][ T9733] ? kmem_cache_free+0x1d9/0x380 [ 1288.174822][ T9733] ? __kfree_skb+0x104/0x140 [ 1288.179491][ T9733] ? nlmon_xmit+0x4b/0x60 [ 1288.183878][ T9733] ? __kfree_skb+0x104/0x140 [ 1288.188474][ T9733] ? consume_skb+0x57/0x180 [ 1288.193030][ T9733] ? nlmon_xmit+0x4b/0x60 [ 1288.197508][ T9733] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1288.202804][ T9733] ? __dev_queue_xmit+0xaae/0x1d80 [ 1288.207924][ T9733] ? ref_tracker_free+0x3a1/0x400 [ 1288.212963][ T9733] netlink_rcv_skb+0x126/0x220 [ 1288.217802][ T9733] ? rtnetlink_bind+0x60/0x60 [ 1288.222483][ T9733] rtnetlink_rcv+0x1c/0x20 [ 1288.226895][ T9733] netlink_unicast+0x589/0x650 [ 1288.231682][ T9733] netlink_sendmsg+0x66e/0x770 [ 1288.236445][ T9733] ? netlink_getsockopt+0x3e0/0x3e0 [ 1288.241645][ T9733] ____sys_sendmsg+0x37c/0x4d0 [ 1288.246421][ T9733] __sys_sendmsg+0x1e9/0x270 [ 1288.251088][ T9733] __x64_sys_sendmsg+0x46/0x50 [ 1288.255896][ T9733] do_syscall_64+0x44/0x110 [ 1288.260583][ T9733] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1288.266483][ T9733] RIP: 0033:0x7efd2e8d0ce9 [ 1288.270935][ T9733] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1288.290565][ T9733] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1288.299381][ T9733] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1288.307460][ T9733] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1288.315430][ T9733] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1288.323412][ T9733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1288.331387][ T9733] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1288.339416][ T9733] 03:20:13 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000002140000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:13 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef586500000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1288.556346][ T9742] wireguard12: entered promiscuous mode [ 1288.561937][ T9742] wireguard12: entered allmulticast mode [ 1288.599451][ T9743] wireguard15: entered promiscuous mode [ 1288.605105][ T9743] wireguard15: entered allmulticast mode 03:20:13 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 72) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1288.744340][ T9749] FAULT_INJECTION: forcing a failure. [ 1288.744340][ T9749] name failslab, interval 1, probability 0, space 0, times 0 [ 1288.757109][ T9749] CPU: 1 PID: 9749 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1288.767554][ T9749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1288.777650][ T9749] Call Trace: [ 1288.780941][ T9749] [ 1288.783862][ T9749] dump_stack_lvl+0xda/0x130 [ 1288.788495][ T9749] dump_stack+0x15/0x20 [ 1288.792711][ T9749] should_fail_ex+0x21f/0x230 [ 1288.797474][ T9749] ? __kernfs_new_node+0x6a/0x380 [ 1288.802499][ T9749] __should_failslab+0x92/0xa0 [ 1288.807301][ T9749] should_failslab+0x9/0x20 [ 1288.811815][ T9749] kmem_cache_alloc+0x4e/0x250 [ 1288.816599][ T9749] __kernfs_new_node+0x6a/0x380 [ 1288.821453][ T9749] ? rb_insert_color+0x263/0x290 [ 1288.826452][ T9749] ? up_write+0x30/0xe0 [ 1288.830609][ T9749] ? kernfs_activate+0x252/0x270 [ 1288.835625][ T9749] kernfs_new_node+0x5f/0xd0 [ 1288.840218][ T9749] __kernfs_create_file+0x49/0x180 [ 1288.845337][ T9749] ? dev_attr_show+0x90/0x90 [ 1288.849931][ T9749] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1288.855308][ T9749] internal_create_group+0x2e4/0x800 [ 1288.860666][ T9749] sysfs_create_groups+0x3c/0xe0 [ 1288.865617][ T9749] device_add_attrs+0x69/0x400 [ 1288.870434][ T9749] ? kobject_put+0xd8/0x160 [ 1288.875065][ T9749] device_add+0x431/0x8b0 [ 1288.879404][ T9749] netdev_register_kobject+0xfc/0x230 [ 1288.884843][ T9749] register_netdevice+0x86f/0xd60 [ 1288.889877][ T9749] ? mutex_lock+0xd/0x30 [ 1288.894143][ T9749] wg_newlink+0x3b2/0x580 [ 1288.898479][ T9749] ? wg_setup+0x1d0/0x1d0 [ 1288.902884][ T9749] rtnl_newlink+0xee5/0x1670 [ 1288.907508][ T9749] ? security_capable+0x5e/0x80 [ 1288.912375][ T9749] ? ns_capable+0x7c/0xb0 [ 1288.916705][ T9749] ? rtnl_setlink+0x300/0x300 [ 1288.921393][ T9749] rtnetlink_rcv_msg+0x807/0x8c0 [ 1288.926337][ T9749] ? memcg_list_lru_alloc+0xd5/0x750 [ 1288.931629][ T9749] ? mod_objcg_state+0x357/0x580 [ 1288.936578][ T9749] ? slab_post_alloc_hook+0x82/0x2f0 [ 1288.941875][ T9749] ? kmem_cache_free+0x1d9/0x380 [ 1288.946848][ T9749] ? __kfree_skb+0x104/0x140 [ 1288.951434][ T9749] ? nlmon_xmit+0x4b/0x60 [ 1288.955771][ T9749] ? __kfree_skb+0x104/0x140 [ 1288.960385][ T9749] ? consume_skb+0x57/0x180 [ 1288.964890][ T9749] ? nlmon_xmit+0x4b/0x60 [ 1288.969358][ T9749] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1288.974652][ T9749] ? __dev_queue_xmit+0xaae/0x1d80 [ 1288.979851][ T9749] ? ref_tracker_free+0x3a1/0x400 [ 1288.984913][ T9749] netlink_rcv_skb+0x126/0x220 [ 1288.989741][ T9749] ? rtnetlink_bind+0x60/0x60 [ 1288.994418][ T9749] rtnetlink_rcv+0x1c/0x20 [ 1288.998835][ T9749] netlink_unicast+0x589/0x650 [ 1289.003613][ T9749] netlink_sendmsg+0x66e/0x770 [ 1289.008407][ T9749] ? netlink_getsockopt+0x3e0/0x3e0 [ 1289.013600][ T9749] ____sys_sendmsg+0x37c/0x4d0 [ 1289.018364][ T9749] __sys_sendmsg+0x1e9/0x270 [ 1289.023014][ T9749] __x64_sys_sendmsg+0x46/0x50 [ 1289.027778][ T9749] do_syscall_64+0x44/0x110 [ 1289.032288][ T9749] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1289.038263][ T9749] RIP: 0033:0x7efd2e8d0ce9 [ 1289.042745][ T9749] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1289.062404][ T9749] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1289.071004][ T9749] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1289.078983][ T9749] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1289.086964][ T9749] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 03:20:14 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x1f000000, 0x0, 0x0, 0x0) mlockall(0x0) [ 1289.094931][ T9749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1289.102939][ T9749] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1289.110932][ T9749] 03:20:14 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b02b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:15 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/bus/input/devices\x00', 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) (async) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) r1 = syz_clone3(&(0x7f0000000380)={0x300004000, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000480), {0x16}, &(0x7f0000000200)=""/170, 0xaa, &(0x7f00000004c0)=""/88, &(0x7f0000000340)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x1, {r0}}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000540)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x8a, 0x0, 0x0) (async) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x8a, 0x0, 0x0) r4 = accept$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r5, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty, 0x80000}, @nfc={0x27, 0x0, 0x1, 0x6}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x0, 0x0, 0x114}) (async) ioctl$sock_SIOCADDRT(r5, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty, 0x80000}, @nfc={0x27, 0x0, 0x1, 0x6}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x0, 0x0, 0x114}) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)={0x50, r6, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xb}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}]}]}, 0x50}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f00000003c0)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f00000003c0)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001840)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000840)={{r4}, r8, 0x3, @unused=[0x7, 0xb55e, 0x2, 0x5], @devid=r9}) (async) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000840)={{r4}, r8, 0x3, @unused=[0x7, 0xb55e, 0x2, 0x5], @devid=r9}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f00000006c0)={{r3}, r8, 0x4, @unused=[0xe2b, 0x4, 0x3, 0x4b4b], @subvolid=0x796}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r10, 0x10f, 0x8a, 0x0, 0x0) (async) setsockopt$TIPC_SRC_DROPPABLE(r10, 0x10f, 0x8a, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, r0, &(0x7f0000000440)={r2, r10, 0x5}) (async) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, r0, &(0x7f0000000440)={r2, r10, 0x5}) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) mlockall(0x5) (async) mlockall(0x5) syz_clone(0x54002100, &(0x7f0000000000)="5906000000f0f2330e618f503d4fc3516b96d69928b5deb598b93940a5c9b524143ea1f1b2ec5fd4aa1aca0c7f8f7c6f84e72467845adf2a9e6571a8b8cdc12291101260ca1443ef8ab2f6b55eead6708bffb023d0ba8c7b87851b0951", 0x5d, 0x0, 0x0, &(0x7f0000000080)="4f4a1207161f0253077cba772434045b70cfa65cc2a5fddfe17a74976531752ff05c4eb38cc05a0a9d98bf8a4982669848ae1446fe263abd5180ead58e5279bfd15481c15485791a70662e110c7600"/88) 03:20:15 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef006600000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:15 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000002150000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:15 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 73) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:15 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b05b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:15 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x1fffefff, 0x0, 0x0, 0x0) mlockall(0x0) [ 1290.033009][ T9764] __nla_validate_parse: 15 callbacks suppressed [ 1290.033022][ T9764] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1290.074589][ T9764] wireguard12: entered promiscuous mode [ 1290.080220][ T9764] wireguard12: entered allmulticast mode [ 1290.108267][ T9769] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1290.136917][ T9769] wireguard15: entered promiscuous mode [ 1290.142523][ T9769] wireguard15: entered allmulticast mode [ 1290.170680][ T9775] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1290.179968][ T9775] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1290.190983][ T9775] FAULT_INJECTION: forcing a failure. [ 1290.190983][ T9775] name failslab, interval 1, probability 0, space 0, times 0 [ 1290.203616][ T9775] CPU: 0 PID: 9775 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1290.214007][ T9775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1290.224059][ T9775] Call Trace: [ 1290.227514][ T9775] [ 1290.230445][ T9775] dump_stack_lvl+0xda/0x130 [ 1290.235072][ T9775] dump_stack+0x15/0x20 [ 1290.239266][ T9775] should_fail_ex+0x21f/0x230 [ 1290.243965][ T9775] ? __kernfs_new_node+0x6a/0x380 [ 1290.249066][ T9775] __should_failslab+0x92/0xa0 [ 1290.253844][ T9775] should_failslab+0x9/0x20 [ 1290.258451][ T9775] kmem_cache_alloc+0x4e/0x250 [ 1290.263215][ T9775] __kernfs_new_node+0x6a/0x380 [ 1290.268072][ T9775] ? rb_insert_color+0x263/0x290 [ 1290.273008][ T9775] ? up_write+0x30/0xe0 [ 1290.277161][ T9775] ? kernfs_activate+0x252/0x270 [ 1290.282101][ T9775] kernfs_new_node+0x5f/0xd0 [ 1290.286734][ T9775] __kernfs_create_file+0x49/0x180 [ 1290.291844][ T9775] ? dev_attr_show+0x90/0x90 [ 1290.296421][ T9775] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1290.301785][ T9775] internal_create_group+0x2e4/0x800 [ 1290.307065][ T9775] sysfs_create_groups+0x3c/0xe0 [ 1290.312096][ T9775] device_add_attrs+0x69/0x400 [ 1290.316901][ T9775] ? kobject_put+0xd8/0x160 [ 1290.321463][ T9775] device_add+0x431/0x8b0 [ 1290.325792][ T9775] netdev_register_kobject+0xfc/0x230 [ 1290.331162][ T9775] register_netdevice+0x86f/0xd60 [ 1290.336337][ T9775] ? mutex_lock+0xd/0x30 [ 1290.340612][ T9775] wg_newlink+0x3b2/0x580 [ 1290.344938][ T9775] ? wg_setup+0x1d0/0x1d0 [ 1290.349261][ T9775] rtnl_newlink+0xee5/0x1670 [ 1290.353853][ T9775] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1290.360098][ T9775] ? _raw_spin_unlock+0x26/0x40 [ 1290.364938][ T9775] ? __mutex_lock+0x21c/0x8d0 [ 1290.369734][ T9775] ? rtnl_setlink+0x300/0x300 [ 1290.374408][ T9775] rtnetlink_rcv_msg+0x807/0x8c0 [ 1290.379335][ T9775] ? memcg_list_lru_alloc+0xd5/0x750 [ 1290.384618][ T9775] ? mod_objcg_state+0x357/0x580 [ 1290.389546][ T9775] ? slab_post_alloc_hook+0x82/0x2f0 [ 1290.394826][ T9775] ? kmem_cache_free+0x1d9/0x380 [ 1290.399829][ T9775] ? __kfree_skb+0x104/0x140 [ 1290.404406][ T9775] ? nlmon_xmit+0x4b/0x60 [ 1290.408723][ T9775] ? __kfree_skb+0x104/0x140 [ 1290.413298][ T9775] ? consume_skb+0x57/0x180 [ 1290.417814][ T9775] ? nlmon_xmit+0x4b/0x60 [ 1290.422139][ T9775] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1290.427448][ T9775] ? __dev_queue_xmit+0xaae/0x1d80 [ 1290.432555][ T9775] ? ref_tracker_free+0x3a1/0x400 [ 1290.437568][ T9775] netlink_rcv_skb+0x126/0x220 [ 1290.442397][ T9775] ? rtnetlink_bind+0x60/0x60 [ 1290.447141][ T9775] rtnetlink_rcv+0x1c/0x20 [ 1290.451543][ T9775] netlink_unicast+0x589/0x650 [ 1290.456434][ T9775] netlink_sendmsg+0x66e/0x770 [ 1290.461182][ T9775] ? netlink_getsockopt+0x3e0/0x3e0 [ 1290.466364][ T9775] ____sys_sendmsg+0x37c/0x4d0 [ 1290.471117][ T9775] __sys_sendmsg+0x1e9/0x270 [ 1290.475774][ T9775] __x64_sys_sendmsg+0x46/0x50 [ 1290.480589][ T9775] do_syscall_64+0x44/0x110 [ 1290.485149][ T9775] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1290.491070][ T9775] RIP: 0033:0x7efd2e8d0ce9 [ 1290.495514][ T9775] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1290.515175][ T9775] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1290.523574][ T9775] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 03:20:15 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/bus/input/devices\x00', 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) r1 = syz_clone3(&(0x7f0000000380)={0x300004000, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000480), {0x16}, &(0x7f0000000200)=""/170, 0xaa, &(0x7f00000004c0)=""/88, &(0x7f0000000340)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x1, {r0}}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000540)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x8a, 0x0, 0x0) r4 = accept$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x1c) socket$inet_tcp(0x2, 0x1, 0x0) (async) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r5, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty, 0x80000}, @nfc={0x27, 0x0, 0x1, 0x6}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x0, 0x0, 0x114}) (async) ioctl$sock_SIOCADDRT(r5, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty, 0x80000}, @nfc={0x27, 0x0, 0x1, 0x6}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00', 0x0, 0x0, 0x114}) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)={0x50, r6, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xb}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}]}]}, 0x50}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f00000003c0)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001840)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001840)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000840)={{r4}, r8, 0x3, @unused=[0x7, 0xb55e, 0x2, 0x5], @devid=r9}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f00000006c0)={{r3}, r8, 0x4, @unused=[0xe2b, 0x4, 0x3, 0x4b4b], @subvolid=0x796}) (async) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f00000006c0)={{r3}, r8, 0x4, @unused=[0xe2b, 0x4, 0x3, 0x4b4b], @subvolid=0x796}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r10, 0x10f, 0x8a, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, r0, &(0x7f0000000440)={r2, r10, 0x5}) shmctl$IPC_RMID(0x0, 0x0) (async) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) mlockall(0x5) syz_clone(0x54002100, &(0x7f0000000000)="5906000000f0f2330e618f503d4fc3516b96d69928b5deb598b93940a5c9b524143ea1f1b2ec5fd4aa1aca0c7f8f7c6f84e72467845adf2a9e6571a8b8cdc12291101260ca1443ef8ab2f6b55eead6708bffb023d0ba8c7b87851b0951", 0x5d, 0x0, 0x0, &(0x7f0000000080)="4f4a1207161f0253077cba772434045b70cfa65cc2a5fddfe17a74976531752ff05c4eb38cc05a0a9d98bf8a4982669848ae1446fe263abd5180ead58e5279bfd15481c15485791a70662e110c7600"/88) (async) syz_clone(0x54002100, &(0x7f0000000000)="5906000000f0f2330e618f503d4fc3516b96d69928b5deb598b93940a5c9b524143ea1f1b2ec5fd4aa1aca0c7f8f7c6f84e72467845adf2a9e6571a8b8cdc12291101260ca1443ef8ab2f6b55eead6708bffb023d0ba8c7b87851b0951", 0x5d, 0x0, 0x0, &(0x7f0000000080)="4f4a1207161f0253077cba772434045b70cfa65cc2a5fddfe17a74976531752ff05c4eb38cc05a0a9d98bf8a4982669848ae1446fe263abd5180ead58e5279bfd15481c15485791a70662e110c7600"/88) [ 1290.531540][ T9775] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1290.539497][ T9775] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1290.547520][ T9775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1290.555475][ T9775] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1290.563439][ T9775] 03:20:15 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000021150000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:15 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef036700000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1290.777413][ T9790] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1290.791261][ T9790] wireguard15: entered promiscuous mode [ 1290.796946][ T9790] wireguard15: entered allmulticast mode 03:20:16 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 74) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1290.820626][ T9792] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1290.833360][ T9792] wireguard12: entered promiscuous mode [ 1290.839065][ T9792] wireguard12: entered allmulticast mode 03:20:16 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef006800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:16 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000021160000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1291.028977][ T9798] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1291.038316][ T9798] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1291.051184][ T9798] FAULT_INJECTION: forcing a failure. [ 1291.051184][ T9798] name failslab, interval 1, probability 0, space 0, times 0 [ 1291.063829][ T9798] CPU: 0 PID: 9798 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1291.074222][ T9798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1291.084282][ T9798] Call Trace: [ 1291.087555][ T9798] [ 1291.090572][ T9798] dump_stack_lvl+0xda/0x130 [ 1291.095187][ T9798] dump_stack+0x15/0x20 [ 1291.099354][ T9798] should_fail_ex+0x21f/0x230 [ 1291.104043][ T9798] ? __kernfs_new_node+0x6a/0x380 [ 1291.109144][ T9798] __should_failslab+0x92/0xa0 [ 1291.113917][ T9798] should_failslab+0x9/0x20 [ 1291.118469][ T9798] kmem_cache_alloc+0x4e/0x250 [ 1291.123433][ T9798] ? kernfs_activate+0x252/0x270 [ 1291.128374][ T9798] __kernfs_new_node+0x6a/0x380 [ 1291.133341][ T9798] ? make_kgid+0x115/0x310 [ 1291.137769][ T9798] ? net_ns_get_ownership+0xae/0xd0 [ 1291.143043][ T9798] ? net_namespace+0x20/0x20 [ 1291.147634][ T9798] kernfs_create_dir_ns+0x62/0x150 [ 1291.152750][ T9798] internal_create_group+0x17a/0x800 [ 1291.158065][ T9798] sysfs_create_groups+0x3c/0xe0 [ 1291.163016][ T9798] device_add_attrs+0xf5/0x400 [ 1291.167795][ T9798] ? kobject_put+0xd8/0x160 [ 1291.172385][ T9798] device_add+0x431/0x8b0 [ 1291.176755][ T9798] netdev_register_kobject+0xfc/0x230 [ 1291.182266][ T9798] register_netdevice+0x86f/0xd60 [ 1291.187332][ T9798] ? mutex_lock+0xd/0x30 [ 1291.191644][ T9798] wg_newlink+0x3b2/0x580 [ 1291.195977][ T9798] ? wg_setup+0x1d0/0x1d0 [ 1291.200385][ T9798] rtnl_newlink+0xee5/0x1670 [ 1291.205001][ T9798] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1291.211308][ T9798] ? _raw_spin_unlock+0x26/0x40 [ 1291.216160][ T9798] ? __mutex_lock+0x21c/0x8d0 [ 1291.220892][ T9798] ? rtnl_setlink+0x300/0x300 [ 1291.225592][ T9798] rtnetlink_rcv_msg+0x807/0x8c0 [ 1291.230524][ T9798] ? memcg_list_lru_alloc+0xd5/0x750 [ 1291.235840][ T9798] ? mod_objcg_state+0x357/0x580 [ 1291.240834][ T9798] ? slab_post_alloc_hook+0x82/0x2f0 [ 1291.246124][ T9798] ? kmem_cache_free+0x1d9/0x380 [ 1291.251107][ T9798] ? __kfree_skb+0x104/0x140 [ 1291.255780][ T9798] ? nlmon_xmit+0x4b/0x60 [ 1291.260171][ T9798] ? __kfree_skb+0x104/0x140 [ 1291.264765][ T9798] ? consume_skb+0x57/0x180 [ 1291.269335][ T9798] ? nlmon_xmit+0x4b/0x60 [ 1291.273693][ T9798] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1291.278990][ T9798] ? __dev_queue_xmit+0xaae/0x1d80 [ 1291.284145][ T9798] ? ref_tracker_free+0x3a1/0x400 [ 1291.289177][ T9798] netlink_rcv_skb+0x126/0x220 [ 1291.293944][ T9798] ? rtnetlink_bind+0x60/0x60 [ 1291.298691][ T9798] rtnetlink_rcv+0x1c/0x20 [ 1291.303114][ T9798] netlink_unicast+0x589/0x650 [ 1291.308026][ T9798] netlink_sendmsg+0x66e/0x770 [ 1291.312799][ T9798] ? netlink_getsockopt+0x3e0/0x3e0 [ 1291.318001][ T9798] ____sys_sendmsg+0x37c/0x4d0 [ 1291.322768][ T9798] __sys_sendmsg+0x1e9/0x270 [ 1291.327361][ T9798] __x64_sys_sendmsg+0x46/0x50 [ 1291.332143][ T9798] do_syscall_64+0x44/0x110 [ 1291.336665][ T9798] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1291.342602][ T9798] RIP: 0033:0x7efd2e8d0ce9 [ 1291.347012][ T9798] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1291.366653][ T9798] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1291.375126][ T9798] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1291.383094][ T9798] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1291.391936][ T9798] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1291.399912][ T9798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1291.407894][ T9798] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1291.415878][ T9798] [ 1291.419526][ T9800] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1291.438246][ T9800] wireguard15: entered promiscuous mode [ 1291.443847][ T9800] wireguard15: entered allmulticast mode [ 1291.493751][ T9803] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1291.526517][ T9803] wireguard12: entered promiscuous mode [ 1291.532081][ T9803] wireguard12: entered allmulticast mode 03:20:16 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x39000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:20:16 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef036a00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:16 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000021170000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:16 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 75) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1291.724573][ T9816] wireguard15: entered promiscuous mode [ 1291.730140][ T9816] wireguard15: entered allmulticast mode [ 1291.765818][ T9817] wireguard12: entered promiscuous mode [ 1291.771448][ T9817] wireguard12: entered allmulticast mode [ 1291.811047][ T9823] FAULT_INJECTION: forcing a failure. [ 1291.811047][ T9823] name failslab, interval 1, probability 0, space 0, times 0 [ 1291.823720][ T9823] CPU: 0 PID: 9823 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1291.834053][ T9823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1291.844104][ T9823] Call Trace: [ 1291.847455][ T9823] [ 1291.850386][ T9823] dump_stack_lvl+0xda/0x130 [ 1291.854992][ T9823] dump_stack+0x15/0x20 [ 1291.859214][ T9823] should_fail_ex+0x21f/0x230 [ 1291.863912][ T9823] ? __kernfs_new_node+0x6a/0x380 [ 1291.868993][ T9823] __should_failslab+0x92/0xa0 [ 1291.873809][ T9823] should_failslab+0x9/0x20 [ 1291.878304][ T9823] kmem_cache_alloc+0x4e/0x250 [ 1291.883109][ T9823] ? kernfs_activate+0x252/0x270 [ 1291.888186][ T9823] __kernfs_new_node+0x6a/0x380 [ 1291.893068][ T9823] ? make_kgid+0x115/0x310 [ 1291.897478][ T9823] ? net_ns_get_ownership+0xae/0xd0 [ 1291.902688][ T9823] ? net_namespace+0x20/0x20 [ 1291.907291][ T9823] kernfs_create_dir_ns+0x62/0x150 [ 1291.912472][ T9823] internal_create_group+0x17a/0x800 [ 1291.917769][ T9823] sysfs_create_groups+0x3c/0xe0 [ 1291.922701][ T9823] device_add_attrs+0xf5/0x400 [ 1291.927534][ T9823] ? kobject_put+0xd8/0x160 [ 1291.932073][ T9823] device_add+0x431/0x8b0 [ 1291.936405][ T9823] netdev_register_kobject+0xfc/0x230 [ 1291.941837][ T9823] register_netdevice+0x86f/0xd60 [ 1291.946862][ T9823] ? mutex_lock+0xd/0x30 [ 1291.951153][ T9823] wg_newlink+0x3b2/0x580 [ 1291.955612][ T9823] ? wg_setup+0x1d0/0x1d0 [ 1291.959933][ T9823] rtnl_newlink+0xee5/0x1670 [ 1291.964614][ T9823] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1291.970850][ T9823] ? _raw_spin_unlock+0x26/0x40 [ 1291.975732][ T9823] ? __mutex_lock+0x21c/0x8d0 [ 1291.980481][ T9823] ? rtnl_setlink+0x300/0x300 [ 1291.985154][ T9823] rtnetlink_rcv_msg+0x807/0x8c0 [ 1291.990182][ T9823] ? memcg_list_lru_alloc+0xd5/0x750 [ 1291.995478][ T9823] ? mod_objcg_state+0x357/0x580 [ 1292.000408][ T9823] ? slab_post_alloc_hook+0x82/0x2f0 [ 1292.005692][ T9823] ? kmem_cache_free+0x1d9/0x380 [ 1292.010650][ T9823] ? __kfree_skb+0x104/0x140 [ 1292.015248][ T9823] ? nlmon_xmit+0x4b/0x60 [ 1292.019569][ T9823] ? __kfree_skb+0x104/0x140 [ 1292.024146][ T9823] ? consume_skb+0x57/0x180 [ 1292.028637][ T9823] ? nlmon_xmit+0x4b/0x60 [ 1292.032966][ T9823] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1292.038268][ T9823] ? __dev_queue_xmit+0xaae/0x1d80 [ 1292.043374][ T9823] ? ref_tracker_free+0x3a1/0x400 [ 1292.048401][ T9823] netlink_rcv_skb+0x126/0x220 [ 1292.053219][ T9823] ? rtnetlink_bind+0x60/0x60 [ 1292.057968][ T9823] rtnetlink_rcv+0x1c/0x20 [ 1292.062434][ T9823] netlink_unicast+0x589/0x650 [ 1292.067202][ T9823] netlink_sendmsg+0x66e/0x770 [ 1292.072006][ T9823] ? netlink_getsockopt+0x3e0/0x3e0 [ 1292.077194][ T9823] ____sys_sendmsg+0x37c/0x4d0 [ 1292.082070][ T9823] __sys_sendmsg+0x1e9/0x270 [ 1292.086726][ T9823] __x64_sys_sendmsg+0x46/0x50 [ 1292.091482][ T9823] do_syscall_64+0x44/0x110 [ 1292.096104][ T9823] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1292.102039][ T9823] RIP: 0033:0x7efd2e8d0ce9 [ 1292.106523][ T9823] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1292.126142][ T9823] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1292.134667][ T9823] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1292.142626][ T9823] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1292.150646][ T9823] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1292.158619][ T9823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1292.166581][ T9823] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1292.174548][ T9823] 03:20:17 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b08b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:17 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef006c00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1292.653339][ T9829] wireguard15: entered promiscuous mode [ 1292.658973][ T9829] wireguard15: entered allmulticast mode 03:20:17 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xc8000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:20:17 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000031c0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 76) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:17 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b0ab78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:17 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef037000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:17 executing program 4: shmctl$IPC_RMID(0x0, 0x0) r0 = shmget$private(0x0, 0x1000, 0x54000000, &(0x7f0000ffa000/0x1000)=nil) mlockall(0x1) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) shmctl$IPC_RMID(r1, 0x0) syz_clone(0x10000, &(0x7f0000000000)="d57a2159e729b919751d99da0d80a9f600ae21ba299cb6efd7de95ea80485e8b64d6256c5f74159aee1572e8c9820c3db0465db69d607eb0bcd5c3f501b1dd5085fffcab02a75c8b934d8e847d0cdc5a8cadcd0ca17cf2bd2424b77a9282ccff2ae5517f04d9a5756ab028d2cab686f74ca50bd717f74f7a9d878bdeb8386fdf3f37c1df9aebac763786681c2865917e41bf77a7faba5f354aa0feb61bf6ad7800000000", 0xa4, 0x0, 0x0, &(0x7f0000000200)) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000, 0x2, &(0x7f0000ffc000/0x3000)=nil) shmget$private(0x0, 0x1000, 0x2a000841, &(0x7f0000ffc000/0x1000)=nil) shmat(r0, &(0x7f0000ffd000/0x2000)=nil, 0x5000) [ 1292.871496][ T9844] wireguard15: entered promiscuous mode [ 1292.877093][ T9844] wireguard15: entered allmulticast mode [ 1292.912566][ T9848] FAULT_INJECTION: forcing a failure. [ 1292.912566][ T9848] name failslab, interval 1, probability 0, space 0, times 0 [ 1292.925316][ T9848] CPU: 1 PID: 9848 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1292.935649][ T9848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1292.945718][ T9848] Call Trace: [ 1292.948993][ T9848] [ 1292.951926][ T9848] dump_stack_lvl+0xda/0x130 [ 1292.956545][ T9848] dump_stack+0x15/0x20 [ 1292.960716][ T9848] should_fail_ex+0x21f/0x230 [ 1292.965436][ T9848] ? __kernfs_new_node+0x6a/0x380 [ 1292.970476][ T9848] __should_failslab+0x92/0xa0 [ 1292.975271][ T9848] should_failslab+0x9/0x20 [ 1292.979875][ T9848] kmem_cache_alloc+0x4e/0x250 [ 1292.984660][ T9848] __kernfs_new_node+0x6a/0x380 [ 1292.989642][ T9848] ? rb_insert_color+0x280/0x290 [ 1292.994584][ T9848] ? up_write+0x30/0xe0 [ 1292.998767][ T9848] ? kernfs_activate+0x252/0x270 [ 1293.003717][ T9848] kernfs_new_node+0x5f/0xd0 [ 1293.008318][ T9848] __kernfs_create_file+0x49/0x180 [ 1293.013536][ T9848] ? dev_attr_show+0x90/0x90 [ 1293.018133][ T9848] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1293.023521][ T9848] internal_create_group+0x2e4/0x800 [ 1293.028822][ T9848] sysfs_create_groups+0x3c/0xe0 [ 1293.033885][ T9848] device_add_attrs+0xf5/0x400 [ 1293.038661][ T9848] ? kobject_put+0xd8/0x160 [ 1293.043231][ T9848] device_add+0x431/0x8b0 [ 1293.047612][ T9848] netdev_register_kobject+0xfc/0x230 [ 1293.053016][ T9848] register_netdevice+0x86f/0xd60 [ 1293.058072][ T9848] ? mutex_lock+0xd/0x30 [ 1293.062376][ T9848] wg_newlink+0x3b2/0x580 [ 1293.066711][ T9848] ? wg_setup+0x1d0/0x1d0 [ 1293.071120][ T9848] rtnl_newlink+0xee5/0x1670 [ 1293.075880][ T9848] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1293.082175][ T9848] ? _raw_spin_unlock+0x26/0x40 [ 1293.087100][ T9848] ? __mutex_lock+0x21c/0x8d0 [ 1293.091838][ T9848] ? rtnl_setlink+0x300/0x300 [ 1293.096526][ T9848] rtnetlink_rcv_msg+0x807/0x8c0 [ 1293.101467][ T9848] ? __rcu_read_unlock+0x4d/0x70 [ 1293.106486][ T9848] ? __rcu_read_unlock+0x4d/0x70 [ 1293.111426][ T9848] ? __refill_stock+0x7f/0xb0 [ 1293.116164][ T9848] ? kmem_cache_free+0x1d9/0x380 [ 1293.121137][ T9848] ? __kfree_skb+0x104/0x140 [ 1293.125733][ T9848] ? nlmon_xmit+0x4b/0x60 [ 1293.130167][ T9848] ? __kfree_skb+0x104/0x140 [ 1293.134767][ T9848] ? consume_skb+0x57/0x180 [ 1293.139282][ T9848] ? nlmon_xmit+0x4b/0x60 [ 1293.143632][ T9848] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1293.148996][ T9848] ? __dev_queue_xmit+0xaae/0x1d80 [ 1293.154125][ T9848] ? ref_tracker_free+0x3a1/0x400 [ 1293.159159][ T9848] netlink_rcv_skb+0x126/0x220 [ 1293.164072][ T9848] ? rtnetlink_bind+0x60/0x60 [ 1293.168802][ T9848] rtnetlink_rcv+0x1c/0x20 [ 1293.173355][ T9848] netlink_unicast+0x589/0x650 [ 1293.178150][ T9848] netlink_sendmsg+0x66e/0x770 [ 1293.182936][ T9848] ? netlink_getsockopt+0x3e0/0x3e0 [ 1293.188201][ T9848] ____sys_sendmsg+0x37c/0x4d0 [ 1293.192996][ T9848] __sys_sendmsg+0x1e9/0x270 [ 1293.197603][ T9848] __x64_sys_sendmsg+0x46/0x50 [ 1293.202429][ T9848] do_syscall_64+0x44/0x110 [ 1293.206960][ T9848] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1293.212875][ T9848] RIP: 0033:0x7efd2e8d0ce9 [ 1293.217396][ T9848] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1293.237007][ T9848] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1293.245493][ T9848] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1293.253470][ T9848] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1293.261444][ T9848] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1293.269416][ T9848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1293.277386][ T9848] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1293.285366][ T9848] [ 1293.293890][ T9839] wireguard12: entered promiscuous mode [ 1293.299534][ T9839] wireguard12: entered allmulticast mode 03:20:18 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b0db78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:18 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef017200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:18 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000001d0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1293.522553][ T9861] wireguard15: entered promiscuous mode [ 1293.528165][ T9861] wireguard15: entered allmulticast mode 03:20:18 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 77) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1293.689966][ T9864] wireguard12: entered promiscuous mode [ 1293.695624][ T9864] wireguard12: entered allmulticast mode [ 1293.740622][ T9872] FAULT_INJECTION: forcing a failure. [ 1293.740622][ T9872] name failslab, interval 1, probability 0, space 0, times 0 [ 1293.753382][ T9872] CPU: 0 PID: 9872 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1293.763737][ T9872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1293.773831][ T9872] Call Trace: [ 1293.777102][ T9872] [ 1293.780030][ T9872] dump_stack_lvl+0xda/0x130 [ 1293.784639][ T9872] dump_stack+0x15/0x20 [ 1293.788956][ T9872] should_fail_ex+0x21f/0x230 [ 1293.793683][ T9872] ? __kernfs_new_node+0x6a/0x380 [ 1293.798746][ T9872] __should_failslab+0x92/0xa0 [ 1293.803587][ T9872] should_failslab+0x9/0x20 [ 1293.808159][ T9872] kmem_cache_alloc+0x4e/0x250 [ 1293.813007][ T9872] __kernfs_new_node+0x6a/0x380 [ 1293.817858][ T9872] ? idr_alloc_cyclic+0x294/0x310 [ 1293.822948][ T9872] ? rb_insert_color+0x6a/0x290 [ 1293.827809][ T9872] ? up_write+0x30/0xe0 [ 1293.831980][ T9872] ? up_write+0x30/0xe0 [ 1293.836183][ T9872] kernfs_new_node+0x5f/0xd0 [ 1293.840860][ T9872] __kernfs_create_file+0x49/0x180 [ 1293.845976][ T9872] ? dev_attr_show+0x90/0x90 [ 1293.850577][ T9872] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1293.855955][ T9872] internal_create_group+0x2e4/0x800 [ 1293.861280][ T9872] sysfs_create_groups+0x3c/0xe0 [ 1293.866226][ T9872] device_add_attrs+0xf5/0x400 [ 1293.871107][ T9872] ? kobject_put+0xd8/0x160 [ 1293.875614][ T9872] device_add+0x431/0x8b0 [ 1293.880041][ T9872] netdev_register_kobject+0xfc/0x230 [ 1293.885461][ T9872] register_netdevice+0x86f/0xd60 03:20:19 executing program 4: shmctl$IPC_RMID(0x0, 0x0) r0 = shmget$private(0x0, 0x1000, 0x54000000, &(0x7f0000ffa000/0x1000)=nil) mlockall(0x1) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) shmctl$IPC_RMID(r1, 0x0) syz_clone(0x10000, &(0x7f0000000000)="d57a2159e729b919751d99da0d80a9f600ae21ba299cb6efd7de95ea80485e8b64d6256c5f74159aee1572e8c9820c3db0465db69d607eb0bcd5c3f501b1dd5085fffcab02a75c8b934d8e847d0cdc5a8cadcd0ca17cf2bd2424b77a9282ccff2ae5517f04d9a5756ab028d2cab686f74ca50bd717f74f7a9d878bdeb8386fdf3f37c1df9aebac763786681c2865917e41bf77a7faba5f354aa0feb61bf6ad7800000000", 0xa4, 0x0, 0x0, &(0x7f0000000200)) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000, 0x2, &(0x7f0000ffc000/0x3000)=nil) shmget$private(0x0, 0x1000, 0x2a000841, &(0x7f0000ffc000/0x1000)=nil) shmat(r0, &(0x7f0000ffd000/0x2000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) (async) shmget$private(0x0, 0x1000, 0x54000000, &(0x7f0000ffa000/0x1000)=nil) (async) mlockall(0x1) (async) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) (async) shmctl$SHM_UNLOCK(r1, 0xc) (async) shmctl$IPC_RMID(r1, 0x0) (async) syz_clone(0x10000, &(0x7f0000000000)="d57a2159e729b919751d99da0d80a9f600ae21ba299cb6efd7de95ea80485e8b64d6256c5f74159aee1572e8c9820c3db0465db69d607eb0bcd5c3f501b1dd5085fffcab02a75c8b934d8e847d0cdc5a8cadcd0ca17cf2bd2424b77a9282ccff2ae5517f04d9a5756ab028d2cab686f74ca50bd717f74f7a9d878bdeb8386fdf3f37c1df9aebac763786681c2865917e41bf77a7faba5f354aa0feb61bf6ad7800000000", 0xa4, 0x0, 0x0, &(0x7f0000000200)) (async) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000, 0x2, &(0x7f0000ffc000/0x3000)=nil) (async) shmget$private(0x0, 0x1000, 0x2a000841, &(0x7f0000ffc000/0x1000)=nil) (async) shmat(r0, &(0x7f0000ffd000/0x2000)=nil, 0x5000) (async) [ 1293.890560][ T9872] ? mutex_lock+0xd/0x30 [ 1293.894873][ T9872] wg_newlink+0x3b2/0x580 [ 1293.899274][ T9872] ? wg_setup+0x1d0/0x1d0 [ 1293.903661][ T9872] rtnl_newlink+0xee5/0x1670 [ 1293.908644][ T9872] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1293.914991][ T9872] ? _raw_spin_unlock+0x26/0x40 [ 1293.919965][ T9872] ? __mutex_lock+0x21c/0x8d0 [ 1293.924656][ T9872] ? rtnl_setlink+0x300/0x300 [ 1293.929416][ T9872] rtnetlink_rcv_msg+0x807/0x8c0 [ 1293.934389][ T9872] ? memcg_list_lru_alloc+0xd5/0x750 [ 1293.939741][ T9872] ? mod_objcg_state+0x357/0x580 [ 1293.944713][ T9872] ? slab_post_alloc_hook+0x82/0x2f0 [ 1293.950006][ T9872] ? kmem_cache_free+0x1d9/0x380 [ 1293.954951][ T9872] ? __kfree_skb+0x104/0x140 [ 1293.959603][ T9872] ? nlmon_xmit+0x4b/0x60 [ 1293.963950][ T9872] ? __kfree_skb+0x104/0x140 [ 1293.968540][ T9872] ? consume_skb+0x57/0x180 [ 1293.973085][ T9872] ? nlmon_xmit+0x4b/0x60 [ 1293.977414][ T9872] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1293.982713][ T9872] ? __dev_queue_xmit+0xaae/0x1d80 [ 1293.987961][ T9872] ? ref_tracker_free+0x3a1/0x400 [ 1293.993002][ T9872] netlink_rcv_skb+0x126/0x220 [ 1293.997775][ T9872] ? rtnetlink_bind+0x60/0x60 [ 1294.002457][ T9872] rtnetlink_rcv+0x1c/0x20 [ 1294.006915][ T9872] netlink_unicast+0x589/0x650 [ 1294.011803][ T9872] netlink_sendmsg+0x66e/0x770 [ 1294.016742][ T9872] ? netlink_getsockopt+0x3e0/0x3e0 [ 1294.021954][ T9872] ____sys_sendmsg+0x37c/0x4d0 [ 1294.026720][ T9872] __sys_sendmsg+0x1e9/0x270 [ 1294.031322][ T9872] __x64_sys_sendmsg+0x46/0x50 [ 1294.036089][ T9872] do_syscall_64+0x44/0x110 [ 1294.040603][ T9872] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1294.046554][ T9872] RIP: 0033:0x7efd2e8d0ce9 [ 1294.051042][ T9872] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1294.070748][ T9872] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1294.079259][ T9872] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 03:20:19 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b0eb78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1294.087244][ T9872] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1294.095216][ T9872] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1294.103187][ T9872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1294.111179][ T9872] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1294.119157][ T9872] 03:20:20 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xcd020000, 0x0, 0x0, 0x0) mlockall(0x0) 03:20:20 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000200000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:20 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef007400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:20 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b0fb78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:20 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) r0 = shmget$private(0x0, 0x1000, 0x54000000, &(0x7f0000ffa000/0x1000)=nil) (async) mlockall(0x1) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) (async) shmctl$IPC_RMID(r1, 0x0) (async) syz_clone(0x10000, &(0x7f0000000000)="d57a2159e729b919751d99da0d80a9f600ae21ba299cb6efd7de95ea80485e8b64d6256c5f74159aee1572e8c9820c3db0465db69d607eb0bcd5c3f501b1dd5085fffcab02a75c8b934d8e847d0cdc5a8cadcd0ca17cf2bd2424b77a9282ccff2ae5517f04d9a5756ab028d2cab686f74ca50bd717f74f7a9d878bdeb8386fdf3f37c1df9aebac763786681c2865917e41bf77a7faba5f354aa0feb61bf6ad7800000000", 0xa4, 0x0, 0x0, &(0x7f0000000200)) (async) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000, 0x2, &(0x7f0000ffc000/0x3000)=nil) shmget$private(0x0, 0x1000, 0x2a000841, &(0x7f0000ffc000/0x1000)=nil) shmat(r0, &(0x7f0000ffd000/0x2000)=nil, 0x5000) 03:20:20 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 78) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1294.969045][ T9888] wireguard12: entered promiscuous mode [ 1294.974702][ T9888] wireguard12: entered allmulticast mode [ 1295.018545][ T9895] wireguard15: entered promiscuous mode [ 1295.024142][ T9895] wireguard15: entered allmulticast mode [ 1295.040321][ T9900] __nla_validate_parse: 15 callbacks suppressed [ 1295.040335][ T9900] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1295.055855][ T9900] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1295.065974][ T9900] FAULT_INJECTION: forcing a failure. [ 1295.065974][ T9900] name failslab, interval 1, probability 0, space 0, times 0 [ 1295.078590][ T9900] CPU: 0 PID: 9900 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1295.088970][ T9900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1295.099036][ T9900] Call Trace: [ 1295.102325][ T9900] [ 1295.105284][ T9900] dump_stack_lvl+0xda/0x130 [ 1295.109969][ T9900] dump_stack+0x15/0x20 [ 1295.114137][ T9900] should_fail_ex+0x21f/0x230 [ 1295.118837][ T9900] ? __kernfs_new_node+0x6a/0x380 [ 1295.123921][ T9900] __should_failslab+0x92/0xa0 [ 1295.128733][ T9900] should_failslab+0x9/0x20 [ 1295.133244][ T9900] kmem_cache_alloc+0x4e/0x250 [ 1295.138058][ T9900] __kernfs_new_node+0x6a/0x380 [ 1295.142989][ T9900] ? rb_insert_color+0x6a/0x290 [ 1295.147849][ T9900] ? up_write+0x30/0xe0 [ 1295.152026][ T9900] ? kernfs_activate+0x252/0x270 [ 1295.157007][ T9900] kernfs_new_node+0x5f/0xd0 [ 1295.161608][ T9900] __kernfs_create_file+0x49/0x180 [ 1295.166738][ T9900] ? dev_attr_show+0x90/0x90 [ 1295.171353][ T9900] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1295.176785][ T9900] internal_create_group+0x2e4/0x800 [ 1295.182082][ T9900] sysfs_create_groups+0x3c/0xe0 [ 1295.187030][ T9900] device_add_attrs+0xf5/0x400 [ 1295.191898][ T9900] ? kobject_put+0xd8/0x160 [ 1295.196462][ T9900] device_add+0x431/0x8b0 [ 1295.200800][ T9900] netdev_register_kobject+0xfc/0x230 [ 1295.206192][ T9900] register_netdevice+0x86f/0xd60 [ 1295.211233][ T9900] ? mutex_lock+0xd/0x30 [ 1295.215547][ T9900] wg_newlink+0x3b2/0x580 [ 1295.219944][ T9900] ? wg_setup+0x1d0/0x1d0 [ 1295.224358][ T9900] rtnl_newlink+0xee5/0x1670 [ 1295.229065][ T9900] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1295.235339][ T9900] ? _raw_spin_unlock+0x26/0x40 [ 1295.240426][ T9900] ? __mutex_lock+0x21c/0x8d0 [ 1295.245114][ T9900] ? rtnl_setlink+0x300/0x300 [ 1295.249797][ T9900] rtnetlink_rcv_msg+0x807/0x8c0 [ 1295.254796][ T9900] ? memcg_list_lru_alloc+0xd5/0x750 [ 1295.260167][ T9900] ? mod_objcg_state+0x357/0x580 [ 1295.265270][ T9900] ? slab_post_alloc_hook+0x82/0x2f0 [ 1295.270642][ T9900] ? kmem_cache_free+0x1d9/0x380 [ 1295.275610][ T9900] ? __kfree_skb+0x104/0x140 [ 1295.280231][ T9900] ? nlmon_xmit+0x4b/0x60 [ 1295.284643][ T9900] ? __kfree_skb+0x104/0x140 [ 1295.289372][ T9900] ? consume_skb+0x57/0x180 [ 1295.293875][ T9900] ? nlmon_xmit+0x4b/0x60 [ 1295.298214][ T9900] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1295.303541][ T9900] ? __dev_queue_xmit+0xaae/0x1d80 [ 1295.308658][ T9900] ? ref_tracker_free+0x3a1/0x400 [ 1295.314248][ T9900] netlink_rcv_skb+0x126/0x220 [ 1295.319161][ T9900] ? rtnetlink_bind+0x60/0x60 [ 1295.323850][ T9900] rtnetlink_rcv+0x1c/0x20 [ 1295.328277][ T9900] netlink_unicast+0x589/0x650 [ 1295.333074][ T9900] netlink_sendmsg+0x66e/0x770 [ 1295.337843][ T9900] ? netlink_getsockopt+0x3e0/0x3e0 [ 1295.343047][ T9900] ____sys_sendmsg+0x37c/0x4d0 [ 1295.347942][ T9900] __sys_sendmsg+0x1e9/0x270 [ 1295.352588][ T9900] __x64_sys_sendmsg+0x46/0x50 [ 1295.357345][ T9900] do_syscall_64+0x44/0x110 [ 1295.361924][ T9900] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1295.367843][ T9900] RIP: 0033:0x7efd2e8d0ce9 [ 1295.372259][ T9900] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1295.391948][ T9900] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1295.400359][ T9900] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1295.408338][ T9900] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1295.416400][ T9900] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1295.424418][ T9900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1295.432427][ T9900] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1295.440494][ T9900] 03:20:20 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000001210000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:20 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef007800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:20 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) r0 = syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee00) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000000)={{0x0, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0x0, 0x1, 0x9}, 0x1, 0x20, 0x7ff, 0x7, r0, r0}) r4 = signalfd4(r2, &(0x7f0000000080)={[0xffffffff00000000]}, 0x8, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000900)=@newlink={0x40, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_6RD_RELAY_PREFIXLEN={0x6}, @IFLA_IPTUN_LINK={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000100)=@delchain={0x214, 0x65, 0x400, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r7, {0xc, 0xc}, {0xffff, 0x7}, {0x1d, 0x3}}, [@TCA_RATE={0x6, 0x5, {0xd, 0xf6}}, @TCA_RATE={0x6, 0x5, {0x1, 0x4}}, @filter_kind_options=@f_flower={{0xb}, {0x1c4, 0x2, [@TCA_FLOWER_KEY_IPV4_SRC_MASK={0x8, 0xb, 0xffffff00}, @TCA_FLOWER_KEY_ENC_OPTS={0x1a0, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_GENEVE={0x24, 0x1, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_GENEVE_TYPE={0x5, 0x2, 0x1f}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_DATA={0x5, 0x3, 0x9}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_TYPE={0x5, 0x2, 0xc0}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_DATA={0x5, 0x3, 0x7}]}, @TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0x34, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x800000}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x54a6}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0xc2a6}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x1f}]}, @TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0x34, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x4}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x6}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0xa9c}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0xade80000}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x4}]}, @TCA_FLOWER_KEY_ENC_OPTS_GENEVE={0x2c, 0x1, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_GENEVE_DATA={0x5, 0x3, 0x40}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_CLASS={0x6}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_TYPE={0x5, 0x2, 0x80}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_CLASS={0x6, 0x1, 0x7}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_DATA={0x5, 0x3, 0x80}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x34, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5, 0x3, 0x8}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x3}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x24, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0x4}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0xc, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0x1f}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x54, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x1ff}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x80000000}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5, 0x3, 0x81}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0x6}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5, 0x3, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5, 0x3, 0x7f}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x2c, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0x3f}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x7}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0xe6}]}]}, @TCA_FLOWER_KEY_UDP_DST={0x6}, @TCA_FLOWER_KEY_ICMPV6_CODE_MASK={0x5}, @TCA_FLOWER_KEY_SCTP_DST={0x6}]}}, @TCA_RATE={0x6, 0x5, {0x4, 0x4}}, @TCA_CHAIN={0x8}]}, 0x214}, 0x1, 0x0, 0x0, 0x20000000}, 0xd0) [ 1295.618412][ T9912] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1295.648204][ T9912] wireguard12: entered promiscuous mode [ 1295.653806][ T9912] wireguard12: entered allmulticast mode [ 1295.683969][ T9913] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:20:20 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xec000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:20:20 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 79) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1295.736695][ T9913] wireguard15: entered promiscuous mode [ 1295.742307][ T9913] wireguard15: entered allmulticast mode [ 1295.852164][ T9923] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1295.861485][ T9923] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1295.871898][ T9923] FAULT_INJECTION: forcing a failure. [ 1295.871898][ T9923] name failslab, interval 1, probability 0, space 0, times 0 [ 1295.884561][ T9923] CPU: 1 PID: 9923 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1295.894919][ T9923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1295.905089][ T9923] Call Trace: [ 1295.908373][ T9923] [ 1295.911293][ T9923] dump_stack_lvl+0xda/0x130 [ 1295.915889][ T9923] dump_stack+0x15/0x20 [ 1295.920039][ T9923] should_fail_ex+0x21f/0x230 [ 1295.924729][ T9923] ? __kernfs_new_node+0x6a/0x380 [ 1295.929968][ T9923] __should_failslab+0x92/0xa0 [ 1295.934737][ T9923] should_failslab+0x9/0x20 [ 1295.939269][ T9923] kmem_cache_alloc+0x4e/0x250 [ 1295.944117][ T9923] __kernfs_new_node+0x6a/0x380 [ 1295.949072][ T9923] ? rb_insert_color+0x280/0x290 [ 1295.954058][ T9923] ? up_write+0x30/0xe0 [ 1295.958256][ T9923] ? kernfs_activate+0x252/0x270 [ 1295.963182][ T9923] kernfs_new_node+0x5f/0xd0 [ 1295.967769][ T9923] __kernfs_create_file+0x49/0x180 [ 1295.972883][ T9923] ? dev_attr_show+0x90/0x90 [ 1295.977569][ T9923] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1295.982958][ T9923] internal_create_group+0x2e4/0x800 [ 1295.988350][ T9923] sysfs_create_groups+0x3c/0xe0 [ 1295.993281][ T9923] device_add_attrs+0xf5/0x400 [ 1295.998058][ T9923] ? kobject_put+0xd8/0x160 [ 1296.002559][ T9923] device_add+0x431/0x8b0 [ 1296.006938][ T9923] netdev_register_kobject+0xfc/0x230 [ 1296.012361][ T9923] register_netdevice+0x86f/0xd60 [ 1296.017405][ T9923] ? mutex_lock+0xd/0x30 [ 1296.021640][ T9923] wg_newlink+0x3b2/0x580 [ 1296.025995][ T9923] ? wg_setup+0x1d0/0x1d0 [ 1296.030382][ T9923] rtnl_newlink+0xee5/0x1670 [ 1296.034992][ T9923] ? security_capable+0x5e/0x80 [ 1296.039832][ T9923] ? ns_capable+0x7c/0xb0 [ 1296.044159][ T9923] ? rtnl_setlink+0x300/0x300 [ 1296.048913][ T9923] rtnetlink_rcv_msg+0x807/0x8c0 [ 1296.053919][ T9923] ? memcg_list_lru_alloc+0xd5/0x750 [ 1296.059253][ T9923] ? mod_objcg_state+0x357/0x580 [ 1296.064222][ T9923] ? slab_post_alloc_hook+0x82/0x2f0 [ 1296.069550][ T9923] ? kmem_cache_free+0x1d9/0x380 [ 1296.074548][ T9923] ? __kfree_skb+0x104/0x140 [ 1296.079142][ T9923] ? nlmon_xmit+0x4b/0x60 [ 1296.083489][ T9923] ? __kfree_skb+0x104/0x140 [ 1296.088071][ T9923] ? consume_skb+0x57/0x180 [ 1296.092613][ T9923] ? nlmon_xmit+0x4b/0x60 [ 1296.096936][ T9923] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1296.102218][ T9923] ? __dev_queue_xmit+0xaae/0x1d80 [ 1296.107391][ T9923] ? ref_tracker_free+0x3a1/0x400 [ 1296.112433][ T9923] netlink_rcv_skb+0x126/0x220 [ 1296.117291][ T9923] ? rtnetlink_bind+0x60/0x60 [ 1296.122002][ T9923] rtnetlink_rcv+0x1c/0x20 [ 1296.126407][ T9923] netlink_unicast+0x589/0x650 [ 1296.131169][ T9923] netlink_sendmsg+0x66e/0x770 [ 1296.136006][ T9923] ? netlink_getsockopt+0x3e0/0x3e0 [ 1296.141271][ T9923] ____sys_sendmsg+0x37c/0x4d0 [ 1296.146150][ T9923] __sys_sendmsg+0x1e9/0x270 [ 1296.150735][ T9923] __x64_sys_sendmsg+0x46/0x50 [ 1296.155505][ T9923] do_syscall_64+0x44/0x110 [ 1296.160109][ T9923] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1296.165996][ T9923] RIP: 0033:0x7efd2e8d0ce9 [ 1296.170530][ T9923] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1296.190133][ T9923] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 03:20:21 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b10b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1296.198574][ T9923] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1296.206533][ T9923] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1296.214496][ T9923] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1296.222457][ T9923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1296.230437][ T9923] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1296.238408][ T9923] 03:20:21 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000240000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:21 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f491c344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:21 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef037800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1296.407639][ T9932] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1296.443601][ T9932] wireguard12: entered promiscuous mode [ 1296.449221][ T9932] wireguard12: entered allmulticast mode [ 1296.482945][ T9939] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1296.506043][ T9939] wireguard15: entered promiscuous mode [ 1296.511620][ T9939] wireguard15: entered allmulticast mode 03:20:21 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 80) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:21 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) (async) r0 = syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) (async, rerun: 32) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) (rerun: 32) shmctl$SHM_UNLOCK(r1, 0xc) (async, rerun: 32) r2 = socket$inet_udplite(0x2, 0x2, 0x88) (rerun: 32) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee00) (async) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000000)={{0x0, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0x0, 0x1, 0x9}, 0x1, 0x20, 0x7ff, 0x7, r0, r0}) (async) r4 = signalfd4(r2, &(0x7f0000000080)={[0xffffffff00000000]}, 0x8, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) (async) r6 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) (async) getsockname$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000900)=@newlink={0x40, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_6RD_RELAY_PREFIXLEN={0x6}, @IFLA_IPTUN_LINK={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) (async, rerun: 32) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000100)=@delchain={0x214, 0x65, 0x400, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r7, {0xc, 0xc}, {0xffff, 0x7}, {0x1d, 0x3}}, [@TCA_RATE={0x6, 0x5, {0xd, 0xf6}}, @TCA_RATE={0x6, 0x5, {0x1, 0x4}}, @filter_kind_options=@f_flower={{0xb}, {0x1c4, 0x2, [@TCA_FLOWER_KEY_IPV4_SRC_MASK={0x8, 0xb, 0xffffff00}, @TCA_FLOWER_KEY_ENC_OPTS={0x1a0, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_GENEVE={0x24, 0x1, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_GENEVE_TYPE={0x5, 0x2, 0x1f}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_DATA={0x5, 0x3, 0x9}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_TYPE={0x5, 0x2, 0xc0}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_DATA={0x5, 0x3, 0x7}]}, @TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0x34, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x800000}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x54a6}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0xc2a6}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x1f}]}, @TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0x34, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x4}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x6}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0xa9c}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0xade80000}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x4}]}, @TCA_FLOWER_KEY_ENC_OPTS_GENEVE={0x2c, 0x1, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_GENEVE_DATA={0x5, 0x3, 0x40}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_CLASS={0x6}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_TYPE={0x5, 0x2, 0x80}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_CLASS={0x6, 0x1, 0x7}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_DATA={0x5, 0x3, 0x80}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x34, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5, 0x3, 0x8}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x3}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x24, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0x4}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0xc, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0x1f}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x54, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x1ff}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x80000000}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5, 0x3, 0x81}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0x6}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5, 0x3, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5, 0x3, 0x7f}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x2c, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0x3f}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x7}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0xe6}]}]}, @TCA_FLOWER_KEY_UDP_DST={0x6}, @TCA_FLOWER_KEY_ICMPV6_CODE_MASK={0x5}, @TCA_FLOWER_KEY_SCTP_DST={0x6}]}}, @TCA_RATE={0x6, 0x5, {0x4, 0x4}}, @TCA_CHAIN={0x8}]}, 0x214}, 0x1, 0x0, 0x0, 0x20000000}, 0xd0) (rerun: 32) 03:20:21 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000250000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:21 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef007a00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1296.671868][ T9949] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1296.709780][ T9949] wireguard12: entered promiscuous mode [ 1296.715491][ T9949] wireguard12: entered allmulticast mode [ 1296.766723][ T9950] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1296.781087][ T9950] wireguard15: entered promiscuous mode [ 1296.786778][ T9950] wireguard15: entered allmulticast mode [ 1296.818091][ T9956] FAULT_INJECTION: forcing a failure. [ 1296.818091][ T9956] name failslab, interval 1, probability 0, space 0, times 0 [ 1296.830746][ T9956] CPU: 1 PID: 9956 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1296.841096][ T9956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1296.851240][ T9956] Call Trace: [ 1296.854522][ T9956] [ 1296.857515][ T9956] dump_stack_lvl+0xda/0x130 [ 1296.862146][ T9956] dump_stack+0x15/0x20 [ 1296.866393][ T9956] should_fail_ex+0x21f/0x230 [ 1296.871160][ T9956] ? __kernfs_new_node+0x6a/0x380 [ 1296.876193][ T9956] __should_failslab+0x92/0xa0 [ 1296.881024][ T9956] should_failslab+0x9/0x20 [ 1296.885577][ T9956] kmem_cache_alloc+0x4e/0x250 [ 1296.890434][ T9956] __kernfs_new_node+0x6a/0x380 [ 1296.895332][ T9956] ? rb_insert_color+0x263/0x290 [ 1296.900350][ T9956] ? up_write+0x30/0xe0 [ 1296.904624][ T9956] ? kernfs_activate+0x252/0x270 [ 1296.909575][ T9956] kernfs_new_node+0x5f/0xd0 [ 1296.914221][ T9956] __kernfs_create_file+0x49/0x180 [ 1296.919405][ T9956] ? dev_attr_show+0x90/0x90 [ 1296.924039][ T9956] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1296.929426][ T9956] internal_create_group+0x2e4/0x800 [ 1296.934796][ T9956] sysfs_create_groups+0x3c/0xe0 [ 1296.939779][ T9956] device_add_attrs+0xf5/0x400 [ 1296.944640][ T9956] ? kobject_put+0xd8/0x160 [ 1296.949173][ T9956] device_add+0x431/0x8b0 [ 1296.953599][ T9956] netdev_register_kobject+0xfc/0x230 [ 1296.959051][ T9956] register_netdevice+0x86f/0xd60 [ 1296.964115][ T9956] ? mutex_lock+0xd/0x30 [ 1296.968375][ T9956] wg_newlink+0x3b2/0x580 [ 1296.972713][ T9956] ? wg_setup+0x1d0/0x1d0 [ 1296.977044][ T9956] rtnl_newlink+0xee5/0x1670 [ 1296.981713][ T9956] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1296.987966][ T9956] ? _raw_spin_unlock+0x26/0x40 [ 1296.992827][ T9956] ? __mutex_lock+0x21c/0x8d0 [ 1296.997574][ T9956] ? rtnl_setlink+0x300/0x300 [ 1297.002292][ T9956] rtnetlink_rcv_msg+0x807/0x8c0 [ 1297.007236][ T9956] ? memcg_list_lru_alloc+0xd5/0x750 [ 1297.012540][ T9956] ? mod_objcg_state+0x357/0x580 [ 1297.017525][ T9956] ? slab_post_alloc_hook+0x82/0x2f0 [ 1297.022878][ T9956] ? kmem_cache_free+0x1d9/0x380 [ 1297.027848][ T9956] ? __kfree_skb+0x104/0x140 [ 1297.032513][ T9956] ? nlmon_xmit+0x4b/0x60 [ 1297.036918][ T9956] ? __kfree_skb+0x104/0x140 [ 1297.041525][ T9956] ? consume_skb+0x57/0x180 [ 1297.046034][ T9956] ? nlmon_xmit+0x4b/0x60 [ 1297.050375][ T9956] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1297.055742][ T9956] ? __dev_queue_xmit+0xaae/0x1d80 [ 1297.060870][ T9956] ? ref_tracker_free+0x3a1/0x400 [ 1297.065907][ T9956] netlink_rcv_skb+0x126/0x220 [ 1297.070738][ T9956] ? rtnetlink_bind+0x60/0x60 [ 1297.075498][ T9956] rtnetlink_rcv+0x1c/0x20 [ 1297.080160][ T9956] netlink_unicast+0x589/0x650 [ 1297.084967][ T9956] netlink_sendmsg+0x66e/0x770 [ 1297.089735][ T9956] ? netlink_getsockopt+0x3e0/0x3e0 [ 1297.094939][ T9956] ____sys_sendmsg+0x37c/0x4d0 [ 1297.099771][ T9956] __sys_sendmsg+0x1e9/0x270 [ 1297.104371][ T9956] __x64_sys_sendmsg+0x46/0x50 [ 1297.109135][ T9956] do_syscall_64+0x44/0x110 [ 1297.113724][ T9956] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1297.119685][ T9956] RIP: 0033:0x7efd2e8d0ce9 [ 1297.124140][ T9956] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1297.143757][ T9956] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1297.152175][ T9956] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1297.160226][ T9956] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 03:20:22 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xef020000, 0x0, 0x0, 0x0) mlockall(0x0) [ 1297.168271][ T9956] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1297.176242][ T9956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1297.184281][ T9956] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1297.192266][ T9956] 03:20:22 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef008100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:22 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000022c0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:22 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b662cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1297.372899][ T9969] wireguard12: entered promiscuous mode [ 1297.378513][ T9969] wireguard12: entered allmulticast mode [ 1297.397637][ T9967] wireguard15: entered promiscuous mode [ 1297.403280][ T9967] wireguard15: entered allmulticast mode 03:20:22 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) (async) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) (async) r0 = syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee00) (async) setresuid(0x0, r3, 0xee00) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000000)={{0x0, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0x0, 0x1, 0x9}, 0x1, 0x20, 0x7ff, 0x7, r0, r0}) r4 = signalfd4(r2, &(0x7f0000000080)={[0xffffffff00000000]}, 0x8, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000900)=@newlink={0x40, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_6RD_RELAY_PREFIXLEN={0x6}, @IFLA_IPTUN_LINK={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000100)=@delchain={0x214, 0x65, 0x400, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r7, {0xc, 0xc}, {0xffff, 0x7}, {0x1d, 0x3}}, [@TCA_RATE={0x6, 0x5, {0xd, 0xf6}}, @TCA_RATE={0x6, 0x5, {0x1, 0x4}}, @filter_kind_options=@f_flower={{0xb}, {0x1c4, 0x2, [@TCA_FLOWER_KEY_IPV4_SRC_MASK={0x8, 0xb, 0xffffff00}, @TCA_FLOWER_KEY_ENC_OPTS={0x1a0, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_GENEVE={0x24, 0x1, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_GENEVE_TYPE={0x5, 0x2, 0x1f}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_DATA={0x5, 0x3, 0x9}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_TYPE={0x5, 0x2, 0xc0}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_DATA={0x5, 0x3, 0x7}]}, @TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0x34, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x800000}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x54a6}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0xc2a6}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x1f}]}, @TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0x34, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x4}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x6}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0xa9c}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0xade80000}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x4}]}, @TCA_FLOWER_KEY_ENC_OPTS_GENEVE={0x2c, 0x1, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_GENEVE_DATA={0x5, 0x3, 0x40}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_CLASS={0x6}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_TYPE={0x5, 0x2, 0x80}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_CLASS={0x6, 0x1, 0x7}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_DATA={0x5, 0x3, 0x80}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x34, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5, 0x3, 0x8}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x3}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x24, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0x4}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0xc, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0x1f}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x54, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x1ff}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x80000000}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5, 0x3, 0x81}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0x6}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5, 0x3, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5, 0x3, 0x7f}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x2c, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0x3f}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x7}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0xe6}]}]}, @TCA_FLOWER_KEY_UDP_DST={0x6}, @TCA_FLOWER_KEY_ICMPV6_CODE_MASK={0x5}, @TCA_FLOWER_KEY_SCTP_DST={0x6}]}}, @TCA_RATE={0x6, 0x5, {0x4, 0x4}}, @TCA_CHAIN={0x8}]}, 0x214}, 0x1, 0x0, 0x0, 0x20000000}, 0xd0) (async) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000100)=@delchain={0x214, 0x65, 0x400, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r7, {0xc, 0xc}, {0xffff, 0x7}, {0x1d, 0x3}}, [@TCA_RATE={0x6, 0x5, {0xd, 0xf6}}, @TCA_RATE={0x6, 0x5, {0x1, 0x4}}, @filter_kind_options=@f_flower={{0xb}, {0x1c4, 0x2, [@TCA_FLOWER_KEY_IPV4_SRC_MASK={0x8, 0xb, 0xffffff00}, @TCA_FLOWER_KEY_ENC_OPTS={0x1a0, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_GENEVE={0x24, 0x1, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_GENEVE_TYPE={0x5, 0x2, 0x1f}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_DATA={0x5, 0x3, 0x9}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_TYPE={0x5, 0x2, 0xc0}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_DATA={0x5, 0x3, 0x7}]}, @TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0x34, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x800000}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x54a6}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0xc2a6}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x1f}]}, @TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0x34, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x4}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x6}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0xa9c}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0xade80000}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x4}]}, @TCA_FLOWER_KEY_ENC_OPTS_GENEVE={0x2c, 0x1, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_GENEVE_DATA={0x5, 0x3, 0x40}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_CLASS={0x6}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_TYPE={0x5, 0x2, 0x80}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_CLASS={0x6, 0x1, 0x7}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_DATA={0x5, 0x3, 0x80}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x34, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5, 0x3, 0x8}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x3}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x24, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0x4}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0xc, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0x1f}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x54, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x1ff}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x80000000}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5, 0x3, 0x81}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0x6}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5, 0x3, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR={0x5, 0x3, 0x7f}]}, @TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x2c, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0x3f}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x7}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0xe6}]}]}, @TCA_FLOWER_KEY_UDP_DST={0x6}, @TCA_FLOWER_KEY_ICMPV6_CODE_MASK={0x5}, @TCA_FLOWER_KEY_SCTP_DST={0x6}]}}, @TCA_RATE={0x6, 0x5, {0x4, 0x4}}, @TCA_CHAIN={0x8}]}, 0x214}, 0x1, 0x0, 0x0, 0x20000000}, 0xd0) 03:20:22 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 81) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:22 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000002d0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:22 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef038100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1297.587453][ T9981] FAULT_INJECTION: forcing a failure. [ 1297.587453][ T9981] name failslab, interval 1, probability 0, space 0, times 0 [ 1297.600350][ T9981] CPU: 1 PID: 9981 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1297.610735][ T9981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1297.620782][ T9981] Call Trace: [ 1297.624052][ T9981] [ 1297.627035][ T9981] dump_stack_lvl+0xda/0x130 [ 1297.631680][ T9981] dump_stack+0x15/0x20 [ 1297.635925][ T9981] should_fail_ex+0x21f/0x230 [ 1297.640663][ T9981] ? __kernfs_new_node+0x6a/0x380 [ 1297.645699][ T9981] __should_failslab+0x92/0xa0 [ 1297.650529][ T9981] should_failslab+0x9/0x20 [ 1297.655041][ T9981] kmem_cache_alloc+0x4e/0x250 [ 1297.659828][ T9981] __kernfs_new_node+0x6a/0x380 [ 1297.664676][ T9981] ? rb_insert_color+0x263/0x290 [ 1297.669672][ T9981] ? up_write+0x30/0xe0 [ 1297.673828][ T9981] ? kernfs_activate+0x252/0x270 [ 1297.678826][ T9981] kernfs_new_node+0x5f/0xd0 [ 1297.683417][ T9981] __kernfs_create_file+0x49/0x180 [ 1297.688529][ T9981] ? dev_attr_show+0x90/0x90 [ 1297.693139][ T9981] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1297.698582][ T9981] internal_create_group+0x2e4/0x800 [ 1297.703875][ T9981] sysfs_create_groups+0x3c/0xe0 [ 1297.708813][ T9981] device_add_attrs+0xf5/0x400 [ 1297.713589][ T9981] ? kobject_put+0xd8/0x160 [ 1297.718103][ T9981] device_add+0x431/0x8b0 [ 1297.722511][ T9981] netdev_register_kobject+0xfc/0x230 [ 1297.727897][ T9981] register_netdevice+0x86f/0xd60 [ 1297.732943][ T9981] ? mutex_lock+0xd/0x30 [ 1297.737197][ T9981] wg_newlink+0x3b2/0x580 [ 1297.741536][ T9981] ? wg_setup+0x1d0/0x1d0 [ 1297.745882][ T9981] rtnl_newlink+0xee5/0x1670 [ 1297.750499][ T9981] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1297.756748][ T9981] ? _raw_spin_unlock+0x26/0x40 [ 1297.761639][ T9981] ? __mutex_lock+0x21c/0x8d0 [ 1297.766339][ T9981] ? rtnl_setlink+0x300/0x300 [ 1297.771107][ T9981] rtnetlink_rcv_msg+0x807/0x8c0 [ 1297.776163][ T9981] ? __rcu_read_unlock+0x4d/0x70 [ 1297.781112][ T9981] ? __rcu_read_unlock+0x4d/0x70 [ 1297.786097][ T9981] ? __refill_stock+0x7f/0xb0 [ 1297.790881][ T9981] ? kmem_cache_free+0x1d9/0x380 [ 1297.795977][ T9981] ? __kfree_skb+0x104/0x140 [ 1297.800570][ T9981] ? nlmon_xmit+0x4b/0x60 [ 1297.804903][ T9981] ? __kfree_skb+0x104/0x140 [ 1297.809498][ T9981] ? consume_skb+0x57/0x180 [ 1297.814012][ T9981] ? nlmon_xmit+0x4b/0x60 [ 1297.818345][ T9981] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1297.823670][ T9981] ? __dev_queue_xmit+0xaae/0x1d80 [ 1297.828840][ T9981] ? ref_tracker_free+0x3a1/0x400 [ 1297.833879][ T9981] netlink_rcv_skb+0x126/0x220 03:20:23 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xf5ffffff, 0x0, 0x0, 0x0) mlockall(0x0) [ 1297.838648][ T9981] ? rtnetlink_bind+0x60/0x60 [ 1297.843323][ T9981] rtnetlink_rcv+0x1c/0x20 [ 1297.847737][ T9981] netlink_unicast+0x589/0x650 [ 1297.852587][ T9981] netlink_sendmsg+0x66e/0x770 [ 1297.857354][ T9981] ? netlink_getsockopt+0x3e0/0x3e0 [ 1297.862548][ T9981] ____sys_sendmsg+0x37c/0x4d0 [ 1297.867390][ T9981] __sys_sendmsg+0x1e9/0x270 [ 1297.872092][ T9981] __x64_sys_sendmsg+0x46/0x50 [ 1297.876907][ T9981] do_syscall_64+0x44/0x110 [ 1297.881430][ T9981] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1297.887411][ T9981] RIP: 0033:0x7efd2e8d0ce9 [ 1297.891816][ T9981] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1297.911445][ T9981] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1297.919841][ T9981] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1297.927869][ T9981] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1297.935875][ T9981] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1297.943833][ T9981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1297.951859][ T9981] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1297.959845][ T9981] [ 1298.005718][ T9988] wireguard15: entered promiscuous mode [ 1298.011339][ T9988] wireguard15: entered allmulticast mode [ 1298.058245][ T9990] wireguard12: entered promiscuous mode [ 1298.063849][ T9990] wireguard12: entered allmulticast mode 03:20:23 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef038300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:23 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b670cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:23 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000012d0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1298.202460][ T9998] wireguard15: entered promiscuous mode [ 1298.208156][ T9998] wireguard15: entered allmulticast mode [ 1298.279125][T10004] wireguard12: entered promiscuous mode [ 1298.284784][T10004] wireguard12: entered allmulticast mode 03:20:23 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 82) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:23 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef478800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:23 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000002f0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1298.537030][T10011] wireguard15: entered promiscuous mode [ 1298.542660][T10011] wireguard15: entered allmulticast mode [ 1298.571707][T10014] FAULT_INJECTION: forcing a failure. [ 1298.571707][T10014] name failslab, interval 1, probability 0, space 0, times 0 [ 1298.584407][T10014] CPU: 0 PID: 10014 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1298.594889][T10014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1298.604940][T10014] Call Trace: [ 1298.608217][T10014] [ 1298.611214][T10014] dump_stack_lvl+0xda/0x130 [ 1298.615817][T10014] dump_stack+0x15/0x20 [ 1298.619989][T10014] should_fail_ex+0x21f/0x230 [ 1298.624695][T10014] ? __kernfs_new_node+0x6a/0x380 [ 1298.629734][T10014] __should_failslab+0x92/0xa0 [ 1298.634596][T10014] should_failslab+0x9/0x20 [ 1298.639112][T10014] kmem_cache_alloc+0x4e/0x250 [ 1298.643880][T10014] __kernfs_new_node+0x6a/0x380 [ 1298.648730][T10014] ? rb_insert_color+0x263/0x290 [ 1298.653669][T10014] ? up_write+0x30/0xe0 [ 1298.657906][T10014] ? kernfs_activate+0x252/0x270 [ 1298.662852][T10014] kernfs_new_node+0x5f/0xd0 [ 1298.667525][T10014] __kernfs_create_file+0x49/0x180 [ 1298.672641][T10014] ? dev_attr_show+0x90/0x90 [ 1298.677227][T10014] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1298.682672][T10014] internal_create_group+0x2e4/0x800 [ 1298.687970][T10014] sysfs_create_groups+0x3c/0xe0 [ 1298.693013][T10014] device_add_attrs+0xf5/0x400 [ 1298.697789][T10014] ? kobject_put+0xd8/0x160 [ 1298.702307][T10014] device_add+0x431/0x8b0 [ 1298.706672][T10014] netdev_register_kobject+0xfc/0x230 [ 1298.712056][T10014] register_netdevice+0x86f/0xd60 [ 1298.717106][T10014] ? mutex_lock+0xd/0x30 [ 1298.721406][T10014] wg_newlink+0x3b2/0x580 [ 1298.725765][T10014] ? wg_setup+0x1d0/0x1d0 [ 1298.730239][T10014] rtnl_newlink+0xee5/0x1670 [ 1298.734934][T10014] ? _raw_spin_unlock+0x26/0x40 [ 1298.740009][T10014] ? __mutex_lock+0x21c/0x8d0 [ 1298.744749][T10014] ? rtnl_setlink+0x300/0x300 [ 1298.749447][T10014] rtnetlink_rcv_msg+0x807/0x8c0 [ 1298.754467][T10014] ? memcg_list_lru_alloc+0xd5/0x750 [ 1298.759894][T10014] ? mod_objcg_state+0x357/0x580 [ 1298.764835][T10014] ? slab_post_alloc_hook+0x82/0x2f0 [ 1298.770208][T10014] ? kmem_cache_free+0x1d9/0x380 [ 1298.775245][T10014] ? __kfree_skb+0x104/0x140 [ 1298.779867][T10014] ? nlmon_xmit+0x4b/0x60 [ 1298.784202][T10014] ? __kfree_skb+0x104/0x140 [ 1298.788794][T10014] ? consume_skb+0x57/0x180 [ 1298.793369][T10014] ? nlmon_xmit+0x4b/0x60 [ 1298.797706][T10014] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1298.803012][T10014] ? __dev_queue_xmit+0xaae/0x1d80 [ 1298.808211][T10014] ? ref_tracker_free+0x3a1/0x400 [ 1298.813281][T10014] netlink_rcv_skb+0x126/0x220 [ 1298.818065][T10014] ? rtnetlink_bind+0x60/0x60 [ 1298.822813][T10014] rtnetlink_rcv+0x1c/0x20 [ 1298.827287][T10014] netlink_unicast+0x589/0x650 [ 1298.832125][T10014] netlink_sendmsg+0x66e/0x770 [ 1298.836889][T10014] ? netlink_getsockopt+0x3e0/0x3e0 [ 1298.842090][T10014] ____sys_sendmsg+0x37c/0x4d0 [ 1298.846903][T10014] __sys_sendmsg+0x1e9/0x270 [ 1298.851575][T10014] __x64_sys_sendmsg+0x46/0x50 [ 1298.856417][T10014] do_syscall_64+0x44/0x110 [ 1298.860950][T10014] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1298.866913][T10014] RIP: 0033:0x7efd2e8d0ce9 [ 1298.871325][T10014] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1298.891109][T10014] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1298.899581][T10014] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1298.907549][T10014] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1298.915584][T10014] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1298.923553][T10014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:20:24 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xfbffffff, 0x0, 0x0, 0x0) mlockall(0x0) [ 1298.931526][T10014] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1298.939495][T10014] [ 1298.963886][T10017] wireguard12: entered promiscuous mode [ 1298.969519][T10017] wireguard12: entered allmulticast mode 03:20:24 executing program 4: shmctl$IPC_RMID(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001400128009000100766c616e000000000400028008000400", @ANYRES32=r2, @ANYBLOB="c5aabb5063527b0211e05f38971cf60a0e3f5bdf5f213efe3186284b727fd31f94ab6f1902b7e3806cc36ed6bebf03ec8adec0e7ac92f20a"], 0x3c}}, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:20:24 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef488800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:24 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf0fa96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:24 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000320000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:24 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 83) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1299.354674][T10034] wireguard15: entered promiscuous mode [ 1299.360275][T10034] wireguard15: entered allmulticast mode [ 1299.430794][T10032] wireguard12: entered promiscuous mode [ 1299.436429][T10032] wireguard12: entered allmulticast mode [ 1299.481051][T10040] FAULT_INJECTION: forcing a failure. [ 1299.481051][T10040] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.493867][T10040] CPU: 1 PID: 10040 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1299.504415][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1299.514468][T10040] Call Trace: [ 1299.517745][T10040] [ 1299.520675][T10040] dump_stack_lvl+0xda/0x130 [ 1299.525378][T10040] dump_stack+0x15/0x20 [ 1299.529542][T10040] should_fail_ex+0x21f/0x230 [ 1299.534246][T10040] ? __kernfs_new_node+0x6a/0x380 [ 1299.539280][T10040] __should_failslab+0x92/0xa0 [ 1299.544129][T10040] should_failslab+0x9/0x20 [ 1299.548713][T10040] kmem_cache_alloc+0x4e/0x250 [ 1299.553486][T10040] __kernfs_new_node+0x6a/0x380 [ 1299.558340][T10040] ? rb_insert_color+0x6a/0x290 [ 1299.563212][T10040] ? up_write+0x30/0xe0 [ 1299.567376][T10040] ? kernfs_activate+0x252/0x270 [ 1299.572319][T10040] kernfs_new_node+0x5f/0xd0 [ 1299.576911][T10040] __kernfs_create_file+0x49/0x180 [ 1299.582076][T10040] ? dev_attr_show+0x90/0x90 [ 1299.586665][T10040] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1299.592079][T10040] internal_create_group+0x2e4/0x800 [ 1299.597492][T10040] sysfs_create_groups+0x3c/0xe0 [ 1299.602446][T10040] device_add_attrs+0xf5/0x400 [ 1299.607224][T10040] ? kobject_put+0xd8/0x160 [ 1299.611760][T10040] device_add+0x431/0x8b0 [ 1299.616102][T10040] netdev_register_kobject+0xfc/0x230 [ 1299.621503][T10040] register_netdevice+0x86f/0xd60 [ 1299.626538][T10040] ? mutex_lock+0xd/0x30 [ 1299.630947][T10040] wg_newlink+0x3b2/0x580 [ 1299.635285][T10040] ? wg_setup+0x1d0/0x1d0 [ 1299.639642][T10040] rtnl_newlink+0xee5/0x1670 [ 1299.644376][T10040] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1299.650627][T10040] ? _raw_spin_unlock+0x26/0x40 [ 1299.655475][T10040] ? __mutex_lock+0x21c/0x8d0 [ 1299.660168][T10040] ? rtnl_setlink+0x300/0x300 [ 1299.664955][T10040] rtnetlink_rcv_msg+0x807/0x8c0 [ 1299.670103][T10040] ? memcg_list_lru_alloc+0xd5/0x750 [ 1299.675432][T10040] ? mod_objcg_state+0x357/0x580 [ 1299.680386][T10040] ? slab_post_alloc_hook+0x82/0x2f0 [ 1299.685714][T10040] ? kmem_cache_free+0x1d9/0x380 [ 1299.690747][T10040] ? __kfree_skb+0x104/0x140 [ 1299.695411][T10040] ? nlmon_xmit+0x4b/0x60 [ 1299.699741][T10040] ? __kfree_skb+0x104/0x140 [ 1299.704329][T10040] ? consume_skb+0x57/0x180 [ 1299.708909][T10040] ? nlmon_xmit+0x4b/0x60 [ 1299.713247][T10040] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1299.718619][T10040] ? __dev_queue_xmit+0xaae/0x1d80 [ 1299.723746][T10040] ? ref_tracker_free+0x3a1/0x400 [ 1299.728816][T10040] netlink_rcv_skb+0x126/0x220 [ 1299.733652][T10040] ? rtnetlink_bind+0x60/0x60 [ 1299.738362][T10040] rtnetlink_rcv+0x1c/0x20 [ 1299.742787][T10040] netlink_unicast+0x589/0x650 [ 1299.747639][T10040] netlink_sendmsg+0x66e/0x770 [ 1299.752449][T10040] ? netlink_getsockopt+0x3e0/0x3e0 [ 1299.757818][T10040] ____sys_sendmsg+0x37c/0x4d0 [ 1299.762585][T10040] __sys_sendmsg+0x1e9/0x270 [ 1299.767188][T10040] __x64_sys_sendmsg+0x46/0x50 [ 1299.772003][T10040] do_syscall_64+0x44/0x110 [ 1299.776603][T10040] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1299.782584][T10040] RIP: 0033:0x7efd2e8d0ce9 [ 1299.786991][T10040] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1299.806605][T10040] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1299.815059][T10040] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1299.823059][T10040] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1299.831032][T10040] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1299.839005][T10040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1299.847053][T10040] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1299.855048][T10040] 03:20:25 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000003340000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:25 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef028c00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1299.980789][T10050] wireguard12: entered promiscuous mode [ 1299.986539][T10050] wireguard12: entered allmulticast mode 03:20:25 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000001360000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1300.109610][T10053] __nla_validate_parse: 19 callbacks suppressed [ 1300.109651][T10053] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:20:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 84) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1300.166813][T10053] wireguard15: entered promiscuous mode [ 1300.172481][T10053] wireguard15: entered allmulticast mode [ 1300.263167][T10055] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1300.303887][T10055] wireguard12: entered promiscuous mode [ 1300.309568][T10055] wireguard12: entered allmulticast mode [ 1300.353094][T10060] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1300.362404][T10060] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1300.373655][T10060] FAULT_INJECTION: forcing a failure. [ 1300.373655][T10060] name failslab, interval 1, probability 0, space 0, times 0 [ 1300.386570][T10060] CPU: 1 PID: 10060 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1300.396994][T10060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1300.407127][T10060] Call Trace: [ 1300.410416][T10060] [ 1300.413340][T10060] dump_stack_lvl+0xda/0x130 [ 1300.417951][T10060] dump_stack+0x15/0x20 [ 1300.422182][T10060] should_fail_ex+0x21f/0x230 [ 1300.426952][T10060] ? __kernfs_new_node+0x6a/0x380 [ 1300.432067][T10060] __should_failslab+0x92/0xa0 [ 1300.436941][T10060] should_failslab+0x9/0x20 [ 1300.441447][T10060] kmem_cache_alloc+0x4e/0x250 [ 1300.446297][T10060] __kernfs_new_node+0x6a/0x380 [ 1300.451220][T10060] ? rb_insert_color+0x6a/0x290 [ 1300.456086][T10060] ? up_write+0x30/0xe0 [ 1300.460263][T10060] ? kernfs_activate+0x252/0x270 [ 1300.465247][T10060] kernfs_new_node+0x5f/0xd0 [ 1300.469848][T10060] __kernfs_create_file+0x49/0x180 [ 1300.474970][T10060] ? dev_attr_show+0x90/0x90 [ 1300.479565][T10060] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1300.484979][T10060] internal_create_group+0x2e4/0x800 [ 1300.490403][T10060] sysfs_create_groups+0x3c/0xe0 [ 1300.495410][T10060] device_add_attrs+0xf5/0x400 [ 1300.500218][T10060] ? kobject_put+0xd8/0x160 [ 1300.504726][T10060] device_add+0x431/0x8b0 [ 1300.509073][T10060] netdev_register_kobject+0xfc/0x230 [ 1300.514508][T10060] register_netdevice+0x86f/0xd60 [ 1300.519553][T10060] ? mutex_lock+0xd/0x30 [ 1300.523811][T10060] wg_newlink+0x3b2/0x580 [ 1300.528146][T10060] ? wg_setup+0x1d0/0x1d0 [ 1300.532535][T10060] rtnl_newlink+0xee5/0x1670 [ 1300.537230][T10060] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1300.543542][T10060] ? _raw_spin_unlock+0x26/0x40 [ 1300.548390][T10060] ? __mutex_lock+0x21c/0x8d0 [ 1300.553326][T10060] ? rtnl_setlink+0x300/0x300 [ 1300.558006][T10060] rtnetlink_rcv_msg+0x807/0x8c0 [ 1300.562986][T10060] ? memcg_list_lru_alloc+0xd5/0x750 [ 1300.568342][T10060] ? mod_objcg_state+0x357/0x580 [ 1300.573440][T10060] ? slab_post_alloc_hook+0x82/0x2f0 [ 1300.578799][T10060] ? kmem_cache_free+0x1d9/0x380 [ 1300.583888][T10060] ? __kfree_skb+0x104/0x140 [ 1300.588481][T10060] ? nlmon_xmit+0x4b/0x60 [ 1300.592848][T10060] ? __kfree_skb+0x104/0x140 [ 1300.597485][T10060] ? consume_skb+0x57/0x180 [ 1300.601982][T10060] ? nlmon_xmit+0x4b/0x60 [ 1300.606307][T10060] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1300.611646][T10060] ? __dev_queue_xmit+0xaae/0x1d80 [ 1300.616751][T10060] ? ref_tracker_free+0x3a1/0x400 [ 1300.621769][T10060] netlink_rcv_skb+0x126/0x220 [ 1300.626523][T10060] ? rtnetlink_bind+0x60/0x60 [ 1300.631191][T10060] rtnetlink_rcv+0x1c/0x20 [ 1300.635594][T10060] netlink_unicast+0x589/0x650 [ 1300.640390][T10060] netlink_sendmsg+0x66e/0x770 [ 1300.645144][T10060] ? netlink_getsockopt+0x3e0/0x3e0 [ 1300.650333][T10060] ____sys_sendmsg+0x37c/0x4d0 [ 1300.655090][T10060] __sys_sendmsg+0x1e9/0x270 [ 1300.659713][T10060] __x64_sys_sendmsg+0x46/0x50 [ 1300.664466][T10060] do_syscall_64+0x44/0x110 [ 1300.669038][T10060] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1300.674926][T10060] RIP: 0033:0x7efd2e8d0ce9 [ 1300.679355][T10060] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1300.699040][T10060] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1300.707442][T10060] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1300.715402][T10060] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1300.723414][T10060] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1300.731373][T10060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1300.739332][T10060] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1300.747297][T10060] 03:20:25 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef038c00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:26 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000390000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1300.864805][T10065] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1300.891338][T10065] wireguard15: entered promiscuous mode [ 1300.896946][T10065] wireguard15: entered allmulticast mode [ 1300.935042][T10069] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1300.983521][T10069] wireguard12: entered promiscuous mode [ 1300.989134][T10069] wireguard12: entered allmulticast mode 03:20:26 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xfc000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:20:26 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') (async) r0 = socket$nl_route(0x10, 0x3, 0x0) (async, rerun: 64) r1 = socket(0x1, 0x803, 0x0) (rerun: 64) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001400128009000100766c616e000000000400028008000400", @ANYRES32=r2, @ANYBLOB="c5aabb5063527b0211e05f38971cf60a0e3f5bdf5f213efe3186284b727fd31f94ab6f1902b7e3806cc36ed6bebf03ec8adec0e7ac92f20a"], 0x3c}}, 0x0) (async) mlockall(0x1) (async, rerun: 64) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) (rerun: 64) 03:20:26 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 85) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1301.408788][T10081] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1301.418075][T10081] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1301.428375][T10081] FAULT_INJECTION: forcing a failure. [ 1301.428375][T10081] name failslab, interval 1, probability 0, space 0, times 0 [ 1301.441081][T10081] CPU: 1 PID: 10081 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1301.451568][T10081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1301.461625][T10081] Call Trace: [ 1301.464903][T10081] [ 1301.467910][T10081] dump_stack_lvl+0xda/0x130 [ 1301.472587][T10081] dump_stack+0x15/0x20 [ 1301.476754][T10081] should_fail_ex+0x21f/0x230 [ 1301.481443][T10081] ? __kernfs_new_node+0x6a/0x380 [ 1301.486503][T10081] __should_failslab+0x92/0xa0 [ 1301.491302][T10081] should_failslab+0x9/0x20 [ 1301.495850][T10081] kmem_cache_alloc+0x4e/0x250 [ 1301.500625][T10081] __kernfs_new_node+0x6a/0x380 [ 1301.505486][T10081] ? rb_insert_color+0x6a/0x290 [ 1301.510347][T10081] ? up_write+0x30/0xe0 [ 1301.514580][T10081] ? kernfs_activate+0x252/0x270 [ 1301.519525][T10081] kernfs_new_node+0x5f/0xd0 [ 1301.524145][T10081] __kernfs_create_file+0x49/0x180 [ 1301.529279][T10081] ? dev_attr_show+0x90/0x90 [ 1301.533950][T10081] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1301.539336][T10081] internal_create_group+0x2e4/0x800 [ 1301.544842][T10081] sysfs_create_groups+0x3c/0xe0 [ 1301.549805][T10081] device_add_attrs+0xf5/0x400 [ 1301.554590][T10081] ? kobject_put+0xd8/0x160 [ 1301.559103][T10081] device_add+0x431/0x8b0 [ 1301.563447][T10081] netdev_register_kobject+0xfc/0x230 [ 1301.568840][T10081] register_netdevice+0x86f/0xd60 [ 1301.573884][T10081] ? mutex_lock+0xd/0x30 [ 1301.578286][T10081] wg_newlink+0x3b2/0x580 [ 1301.582627][T10081] ? wg_setup+0x1d0/0x1d0 [ 1301.586961][T10081] rtnl_newlink+0xee5/0x1670 [ 1301.591579][T10081] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1301.597838][T10081] ? _raw_spin_unlock+0x26/0x40 [ 1301.602712][T10081] ? __mutex_lock+0x21c/0x8d0 [ 1301.607405][T10081] ? rtnl_setlink+0x300/0x300 [ 1301.612240][T10081] rtnetlink_rcv_msg+0x807/0x8c0 [ 1301.617188][T10081] ? memcg_list_lru_alloc+0xd5/0x750 [ 1301.622496][T10081] ? mod_objcg_state+0x357/0x580 [ 1301.627440][T10081] ? slab_post_alloc_hook+0x82/0x2f0 [ 1301.632737][T10081] ? kmem_cache_free+0x1d9/0x380 [ 1301.637734][T10081] ? __kfree_skb+0x104/0x140 [ 1301.642428][T10081] ? nlmon_xmit+0x4b/0x60 [ 1301.646813][T10081] ? __kfree_skb+0x104/0x140 [ 1301.651439][T10081] ? consume_skb+0x57/0x180 [ 1301.655943][T10081] ? nlmon_xmit+0x4b/0x60 [ 1301.660284][T10081] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1301.665608][T10081] ? __dev_queue_xmit+0xaae/0x1d80 [ 1301.670870][T10081] ? ref_tracker_free+0x3a1/0x400 [ 1301.675909][T10081] netlink_rcv_skb+0x126/0x220 [ 1301.680815][T10081] ? rtnetlink_bind+0x60/0x60 [ 1301.685501][T10081] rtnetlink_rcv+0x1c/0x20 [ 1301.689990][T10081] netlink_unicast+0x589/0x650 [ 1301.694828][T10081] netlink_sendmsg+0x66e/0x770 [ 1301.699597][T10081] ? netlink_getsockopt+0x3e0/0x3e0 [ 1301.704850][T10081] ____sys_sendmsg+0x37c/0x4d0 [ 1301.709626][T10081] __sys_sendmsg+0x1e9/0x270 [ 1301.714228][T10081] __x64_sys_sendmsg+0x46/0x50 [ 1301.718991][T10081] do_syscall_64+0x44/0x110 [ 1301.723570][T10081] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1301.729486][T10081] RIP: 0033:0x7efd2e8d0ce9 [ 1301.733979][T10081] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1301.753727][T10081] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1301.762154][T10081] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1301.770207][T10081] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1301.778178][T10081] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1301.786155][T10081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1301.794129][T10081] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1301.802305][T10081] 03:20:27 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef009300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:27 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf10a96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:27 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000003a0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1301.999120][T10086] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1302.055315][T10086] wireguard15: entered promiscuous mode [ 1302.060972][T10086] wireguard15: entered allmulticast mode [ 1302.113075][T10088] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:20:27 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 86) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1302.169072][T10088] wireguard12: entered promiscuous mode [ 1302.174683][T10088] wireguard12: entered allmulticast mode [ 1302.276501][T10100] FAULT_INJECTION: forcing a failure. [ 1302.276501][T10100] name failslab, interval 1, probability 0, space 0, times 0 [ 1302.289622][T10100] CPU: 1 PID: 10100 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1302.300097][T10100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1302.310192][T10100] Call Trace: [ 1302.313470][T10100] [ 1302.316399][T10100] dump_stack_lvl+0xda/0x130 [ 1302.321003][T10100] dump_stack+0x15/0x20 [ 1302.325168][T10100] should_fail_ex+0x21f/0x230 [ 1302.329904][T10100] ? __kernfs_new_node+0x6a/0x380 [ 1302.335016][T10100] __should_failslab+0x92/0xa0 [ 1302.339802][T10100] should_failslab+0x9/0x20 [ 1302.344340][T10100] kmem_cache_alloc+0x4e/0x250 [ 1302.349134][T10100] __kernfs_new_node+0x6a/0x380 [ 1302.353992][T10100] ? rb_insert_color+0x263/0x290 [ 1302.358984][T10100] ? up_write+0x30/0xe0 [ 1302.363134][T10100] ? kernfs_activate+0x252/0x270 [ 1302.368156][T10100] kernfs_new_node+0x5f/0xd0 [ 1302.372751][T10100] __kernfs_create_file+0x49/0x180 [ 1302.377875][T10100] ? dev_attr_show+0x90/0x90 [ 1302.382470][T10100] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1302.387905][T10100] internal_create_group+0x2e4/0x800 [ 1302.393226][T10100] sysfs_create_groups+0x3c/0xe0 [ 1302.398177][T10100] device_add_attrs+0xf5/0x400 [ 1302.402986][T10100] ? kobject_put+0xd8/0x160 [ 1302.407500][T10100] device_add+0x431/0x8b0 [ 1302.411876][T10100] netdev_register_kobject+0xfc/0x230 [ 1302.417294][T10100] register_netdevice+0x86f/0xd60 [ 1302.422476][T10100] ? mutex_lock+0xd/0x30 [ 1302.426812][T10100] wg_newlink+0x3b2/0x580 [ 1302.431151][T10100] ? wg_setup+0x1d0/0x1d0 [ 1302.435534][T10100] rtnl_newlink+0xee5/0x1670 [ 1302.440173][T10100] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1302.446433][T10100] ? _raw_spin_unlock+0x26/0x40 [ 1302.451334][T10100] ? __mutex_lock+0x21c/0x8d0 [ 1302.456044][T10100] ? rtnl_setlink+0x300/0x300 [ 1302.460738][T10100] rtnetlink_rcv_msg+0x807/0x8c0 [ 1302.465689][T10100] ? memcg_list_lru_alloc+0xd5/0x750 [ 1302.471044][T10100] ? mod_objcg_state+0x357/0x580 [ 1302.476041][T10100] ? slab_post_alloc_hook+0x82/0x2f0 [ 1302.481348][T10100] ? kmem_cache_free+0x1d9/0x380 [ 1302.486332][T10100] ? __kfree_skb+0x104/0x140 [ 1302.490975][T10100] ? nlmon_xmit+0x4b/0x60 [ 1302.495369][T10100] ? __kfree_skb+0x104/0x140 [ 1302.499957][T10100] ? consume_skb+0x57/0x180 [ 1302.504476][T10100] ? nlmon_xmit+0x4b/0x60 [ 1302.508841][T10100] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1302.514134][T10100] ? __dev_queue_xmit+0xaae/0x1d80 [ 1302.519251][T10100] ? ref_tracker_free+0x3a1/0x400 [ 1302.524345][T10100] netlink_rcv_skb+0x126/0x220 [ 1302.529106][T10100] ? rtnetlink_bind+0x60/0x60 [ 1302.533789][T10100] rtnetlink_rcv+0x1c/0x20 [ 1302.538272][T10100] netlink_unicast+0x589/0x650 [ 1302.543094][T10100] netlink_sendmsg+0x66e/0x770 [ 1302.547920][T10100] ? netlink_getsockopt+0x3e0/0x3e0 [ 1302.553136][T10100] ____sys_sendmsg+0x37c/0x4d0 [ 1302.557979][T10100] __sys_sendmsg+0x1e9/0x270 [ 1302.562601][T10100] __x64_sys_sendmsg+0x46/0x50 [ 1302.567388][T10100] do_syscall_64+0x44/0x110 [ 1302.571973][T10100] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1302.577927][T10100] RIP: 0033:0x7efd2e8d0ce9 [ 1302.582450][T10100] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1302.602065][T10100] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1302.610475][T10100] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1302.618532][T10100] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 03:20:27 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') (async) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001400128009000100766c616e000000000400028008000400", @ANYRES32=r2, @ANYBLOB="c5aabb5063527b0211e05f38971cf60a0e3f5bdf5f213efe3186284b727fd31f94ab6f1902b7e3806cc36ed6bebf03ec8adec0e7ac92f20a"], 0x3c}}, 0x0) (async) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 1302.626542][T10100] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1302.634520][T10100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1302.642493][T10100] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1302.650491][T10100] 03:20:27 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000033a0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:27 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef039600000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1302.813723][T10108] wireguard15: entered promiscuous mode [ 1302.819345][T10108] wireguard15: entered allmulticast mode [ 1302.861825][T10105] wireguard12: entered promiscuous mode [ 1302.867473][T10105] wireguard12: entered allmulticast mode 03:20:28 executing program 4: shmctl$IPC_RMID(0x0, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:20:28 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0f9700000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1303.034165][T10118] wireguard15: entered promiscuous mode [ 1303.039809][T10118] wireguard15: entered allmulticast mode 03:20:28 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xffefff1f, 0x0, 0x0, 0x0) mlockall(0x0) 03:20:28 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf11a96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:28 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000003f0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 87) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:28 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef029d00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:28 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) shmctl$SHM_UNLOCK(0x0, 0xc) (async) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 1303.624461][T10132] wireguard15: entered promiscuous mode [ 1303.630100][T10132] wireguard15: entered allmulticast mode [ 1303.664302][T10131] wireguard12: entered promiscuous mode [ 1303.669881][T10131] wireguard12: entered allmulticast mode [ 1303.731715][T10142] FAULT_INJECTION: forcing a failure. [ 1303.731715][T10142] name failslab, interval 1, probability 0, space 0, times 0 [ 1303.744438][T10142] CPU: 0 PID: 10142 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1303.754853][T10142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1303.764910][T10142] Call Trace: [ 1303.768185][T10142] [ 1303.771115][T10142] dump_stack_lvl+0xda/0x130 [ 1303.775823][T10142] dump_stack+0x15/0x20 [ 1303.780059][T10142] should_fail_ex+0x21f/0x230 [ 1303.784901][T10142] ? __kernfs_new_node+0x6a/0x380 [ 1303.789979][T10142] __should_failslab+0x92/0xa0 [ 1303.794768][T10142] should_failslab+0x9/0x20 [ 1303.799282][T10142] kmem_cache_alloc+0x4e/0x250 [ 1303.804057][T10142] __kernfs_new_node+0x6a/0x380 [ 1303.808988][T10142] ? rb_insert_color+0x263/0x290 [ 1303.814008][T10142] ? up_write+0x30/0xe0 [ 1303.818165][T10142] ? kernfs_activate+0x252/0x270 [ 1303.823106][T10142] kernfs_new_node+0x5f/0xd0 [ 1303.827698][T10142] __kernfs_create_file+0x49/0x180 [ 1303.832861][T10142] ? dev_attr_show+0x90/0x90 [ 1303.837449][T10142] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1303.842928][T10142] internal_create_group+0x2e4/0x800 [ 1303.848226][T10142] sysfs_create_groups+0x3c/0xe0 [ 1303.853173][T10142] device_add_attrs+0xf5/0x400 [ 1303.858066][T10142] ? kobject_put+0xd8/0x160 [ 1303.862585][T10142] device_add+0x431/0x8b0 [ 1303.866994][T10142] netdev_register_kobject+0xfc/0x230 [ 1303.872451][T10142] register_netdevice+0x86f/0xd60 [ 1303.877568][T10142] ? mutex_lock+0xd/0x30 [ 1303.881830][T10142] wg_newlink+0x3b2/0x580 [ 1303.886247][T10142] ? wg_setup+0x1d0/0x1d0 [ 1303.890633][T10142] rtnl_newlink+0xee5/0x1670 [ 1303.895244][T10142] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1303.901499][T10142] ? _raw_spin_unlock+0x26/0x40 [ 1303.906416][T10142] ? __mutex_lock+0x21c/0x8d0 [ 1303.911114][T10142] ? rtnl_setlink+0x300/0x300 [ 1303.915799][T10142] rtnetlink_rcv_msg+0x807/0x8c0 [ 1303.920754][T10142] ? memcg_list_lru_alloc+0xd5/0x750 [ 1303.926258][T10142] ? mod_objcg_state+0x357/0x580 [ 1303.931215][T10142] ? slab_post_alloc_hook+0x82/0x2f0 [ 1303.936513][T10142] ? kmem_cache_free+0x1d9/0x380 [ 1303.941519][T10142] ? __kfree_skb+0x104/0x140 [ 1303.946114][T10142] ? nlmon_xmit+0x4b/0x60 [ 1303.950561][T10142] ? __kfree_skb+0x104/0x140 [ 1303.955157][T10142] ? consume_skb+0x57/0x180 [ 1303.959668][T10142] ? nlmon_xmit+0x4b/0x60 [ 1303.964023][T10142] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1303.969399][T10142] ? __dev_queue_xmit+0xaae/0x1d80 [ 1303.974526][T10142] ? ref_tracker_free+0x3a1/0x400 [ 1303.979568][T10142] netlink_rcv_skb+0x126/0x220 [ 1303.984381][T10142] ? rtnetlink_bind+0x60/0x60 [ 1303.989061][T10142] rtnetlink_rcv+0x1c/0x20 [ 1303.993509][T10142] netlink_unicast+0x589/0x650 [ 1303.998323][T10142] netlink_sendmsg+0x66e/0x770 [ 1304.003111][T10142] ? netlink_getsockopt+0x3e0/0x3e0 [ 1304.008438][T10142] ____sys_sendmsg+0x37c/0x4d0 [ 1304.013215][T10142] __sys_sendmsg+0x1e9/0x270 [ 1304.017850][T10142] __x64_sys_sendmsg+0x46/0x50 [ 1304.022688][T10142] do_syscall_64+0x44/0x110 [ 1304.027210][T10142] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1304.033124][T10142] RIP: 0033:0x7efd2e8d0ce9 [ 1304.037541][T10142] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1304.057233][T10142] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1304.065695][T10142] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1304.073681][T10142] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 03:20:29 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef02a000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1304.081818][T10142] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1304.089791][T10142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1304.097787][T10142] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1304.105771][T10142] 03:20:29 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000400000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1304.208121][T10153] wireguard15: entered promiscuous mode [ 1304.213743][T10153] wireguard15: entered allmulticast mode 03:20:29 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00a400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1304.365012][T10157] wireguard12: entered promiscuous mode [ 1304.370598][T10157] wireguard12: entered allmulticast mode 03:20:29 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf12a96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 88) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:29 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000440000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1304.473739][T10160] wireguard15: entered promiscuous mode [ 1304.479458][T10160] wireguard15: entered allmulticast mode [ 1304.624719][T10169] FAULT_INJECTION: forcing a failure. [ 1304.624719][T10169] name failslab, interval 1, probability 0, space 0, times 0 [ 1304.637656][T10169] CPU: 1 PID: 10169 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1304.648080][T10169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1304.658160][T10169] Call Trace: [ 1304.661439][T10169] [ 1304.664369][T10169] dump_stack_lvl+0xda/0x130 [ 1304.668998][T10169] dump_stack+0x15/0x20 [ 1304.673160][T10169] should_fail_ex+0x21f/0x230 [ 1304.677852][T10169] ? __kernfs_new_node+0x6a/0x380 [ 1304.683018][T10169] __should_failslab+0x92/0xa0 [ 1304.687884][T10169] should_failslab+0x9/0x20 [ 1304.692394][T10169] kmem_cache_alloc+0x4e/0x250 [ 1304.697160][T10169] __kernfs_new_node+0x6a/0x380 [ 1304.702031][T10169] ? rb_insert_color+0x263/0x290 [ 1304.707086][T10169] ? up_write+0x30/0xe0 [ 1304.711243][T10169] ? kernfs_activate+0x252/0x270 [ 1304.716287][T10169] kernfs_new_node+0x5f/0xd0 [ 1304.720920][T10169] __kernfs_create_file+0x49/0x180 [ 1304.726091][T10169] ? dev_attr_show+0x90/0x90 [ 1304.730685][T10169] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1304.736139][T10169] internal_create_group+0x2e4/0x800 [ 1304.741467][T10169] sysfs_create_groups+0x3c/0xe0 [ 1304.746452][T10169] device_add_attrs+0xf5/0x400 [ 1304.751305][T10169] ? kobject_put+0xd8/0x160 [ 1304.755870][T10169] device_add+0x431/0x8b0 [ 1304.760204][T10169] netdev_register_kobject+0xfc/0x230 [ 1304.765625][T10169] register_netdevice+0x86f/0xd60 [ 1304.770663][T10169] ? mutex_lock+0xd/0x30 [ 1304.775030][T10169] wg_newlink+0x3b2/0x580 [ 1304.779424][T10169] ? wg_setup+0x1d0/0x1d0 [ 1304.783831][T10169] rtnl_newlink+0xee5/0x1670 [ 1304.788513][T10169] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1304.794767][T10169] ? _raw_spin_unlock+0x26/0x40 [ 1304.799693][T10169] ? __mutex_lock+0x21c/0x8d0 [ 1304.804378][T10169] ? rtnl_setlink+0x300/0x300 [ 1304.809064][T10169] rtnetlink_rcv_msg+0x807/0x8c0 [ 1304.814002][T10169] ? memcg_list_lru_alloc+0xd5/0x750 [ 1304.819302][T10169] ? mod_objcg_state+0x357/0x580 [ 1304.824246][T10169] ? slab_post_alloc_hook+0x82/0x2f0 [ 1304.829547][T10169] ? kmem_cache_free+0x1d9/0x380 [ 1304.834499][T10169] ? __kfree_skb+0x104/0x140 [ 1304.839134][T10169] ? nlmon_xmit+0x4b/0x60 [ 1304.843557][T10169] ? __kfree_skb+0x104/0x140 [ 1304.848161][T10169] ? consume_skb+0x57/0x180 [ 1304.852728][T10169] ? nlmon_xmit+0x4b/0x60 [ 1304.857064][T10169] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1304.862427][T10169] ? __dev_queue_xmit+0xaae/0x1d80 [ 1304.867545][T10169] ? ref_tracker_free+0x3a1/0x400 [ 1304.872584][T10169] netlink_rcv_skb+0x126/0x220 [ 1304.877353][T10169] ? rtnetlink_bind+0x60/0x60 [ 1304.882054][T10169] rtnetlink_rcv+0x1c/0x20 [ 1304.886485][T10169] netlink_unicast+0x589/0x650 [ 1304.891320][T10169] netlink_sendmsg+0x66e/0x770 [ 1304.896165][T10169] ? netlink_getsockopt+0x3e0/0x3e0 [ 1304.901368][T10169] ____sys_sendmsg+0x37c/0x4d0 [ 1304.906144][T10169] __sys_sendmsg+0x1e9/0x270 [ 1304.910801][T10169] __x64_sys_sendmsg+0x46/0x50 [ 1304.915632][T10169] do_syscall_64+0x44/0x110 [ 1304.920166][T10169] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1304.926126][T10169] RIP: 0033:0x7efd2e8d0ce9 [ 1304.930551][T10169] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1304.950293][T10169] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1304.958704][T10169] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1304.966708][T10169] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1304.974717][T10169] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1304.982699][T10169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1304.990672][T10169] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1304.998996][T10169] [ 1305.050036][T10170] wireguard12: entered promiscuous mode [ 1305.055665][T10170] wireguard12: entered allmulticast mode 03:20:31 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef01a800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:31 executing program 4: shmctl$IPC_RMID(0x0, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) (async) shmctl$SHM_UNLOCK(0x0, 0xc) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:20:31 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000ee470000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 89) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:31 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf13a96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:31 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xfffffff5, 0x0, 0x0, 0x0) mlockall(0x0) [ 1306.313795][T10179] __nla_validate_parse: 15 callbacks suppressed [ 1306.313810][T10179] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1306.356523][T10179] wireguard12: entered promiscuous mode [ 1306.362093][T10179] wireguard12: entered allmulticast mode [ 1306.404940][T10183] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1306.425492][T10183] wireguard15: entered promiscuous mode [ 1306.431154][T10183] wireguard15: entered allmulticast mode [ 1306.458458][T10187] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1306.467728][T10187] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1306.477962][T10187] FAULT_INJECTION: forcing a failure. [ 1306.477962][T10187] name failslab, interval 1, probability 0, space 0, times 0 [ 1306.490999][T10187] CPU: 1 PID: 10187 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1306.501483][T10187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1306.511534][T10187] Call Trace: [ 1306.514811][T10187] [ 1306.517792][T10187] dump_stack_lvl+0xda/0x130 [ 1306.522427][T10187] dump_stack+0x15/0x20 [ 1306.526598][T10187] should_fail_ex+0x21f/0x230 [ 1306.531306][T10187] ? __kernfs_new_node+0x6a/0x380 [ 1306.536340][T10187] __should_failslab+0x92/0xa0 [ 1306.541140][T10187] should_failslab+0x9/0x20 [ 1306.545688][T10187] kmem_cache_alloc+0x4e/0x250 [ 1306.550548][T10187] __kernfs_new_node+0x6a/0x380 [ 1306.555566][T10187] ? rb_insert_color+0x280/0x290 [ 1306.560509][T10187] ? up_write+0x30/0xe0 [ 1306.564681][T10187] ? kernfs_activate+0x252/0x270 [ 1306.569624][T10187] kernfs_new_node+0x5f/0xd0 [ 1306.574296][T10187] __kernfs_create_file+0x49/0x180 [ 1306.579419][T10187] ? dev_attr_show+0x90/0x90 [ 1306.584005][T10187] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1306.589389][T10187] internal_create_group+0x2e4/0x800 [ 1306.594697][T10187] sysfs_create_groups+0x3c/0xe0 [ 1306.599643][T10187] device_add_attrs+0xf5/0x400 [ 1306.604429][T10187] ? kobject_put+0xd8/0x160 [ 1306.609030][T10187] device_add+0x431/0x8b0 [ 1306.613429][T10187] netdev_register_kobject+0xfc/0x230 [ 1306.618889][T10187] register_netdevice+0x86f/0xd60 [ 1306.623987][T10187] ? mutex_lock+0xd/0x30 [ 1306.628252][T10187] wg_newlink+0x3b2/0x580 [ 1306.632596][T10187] ? wg_setup+0x1d0/0x1d0 [ 1306.636995][T10187] rtnl_newlink+0xee5/0x1670 [ 1306.641644][T10187] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1306.648070][T10187] ? _raw_spin_unlock+0x26/0x40 [ 1306.652973][T10187] ? __mutex_lock+0x21c/0x8d0 [ 1306.657748][T10187] ? rtnl_setlink+0x300/0x300 [ 1306.662434][T10187] rtnetlink_rcv_msg+0x807/0x8c0 [ 1306.667377][T10187] ? memcg_account_kmem+0x121/0x140 [ 1306.672585][T10187] ? __rcu_read_unlock+0x4d/0x70 [ 1306.677527][T10187] ? mod_objcg_state+0x357/0x580 [ 1306.682474][T10187] ? slab_post_alloc_hook+0x82/0x2f0 [ 1306.687769][T10187] ? kmem_cache_free+0x1d9/0x380 [ 1306.692719][T10187] ? __kfree_skb+0x104/0x140 [ 1306.697316][T10187] ? nlmon_xmit+0x4b/0x60 [ 1306.701649][T10187] ? __kfree_skb+0x104/0x140 03:20:31 executing program 4: shmctl$IPC_RMID(0x0, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x3000)=nil, 0x4000) mlockall(0x1) syz_clone(0x20040000, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000000)="0d1e0012175f1684a2ffe7275ec492458af7123e84542afee09a15b7d36d1c4956c3e0af9c62de0a931c781e416113af1005a18947de22355e59bebe05c8d08984f4032929768541fc64e43098b87d65325842a4f6a72cb5b0d1caaa0a3ad234996329b23479ef9426e4282099b02fe39dda04a8b57dfc7f2c17dbd6aa714616a3b3bd701a73708c2e") [ 1306.706309][T10187] ? consume_skb+0x57/0x180 [ 1306.710814][T10187] ? nlmon_xmit+0x4b/0x60 [ 1306.715152][T10187] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1306.720502][T10187] ? __dev_queue_xmit+0xaae/0x1d80 [ 1306.725613][T10187] ? ref_tracker_free+0x3a1/0x400 [ 1306.730725][T10187] netlink_rcv_skb+0x126/0x220 [ 1306.735502][T10187] ? rtnetlink_bind+0x60/0x60 [ 1306.740193][T10187] rtnetlink_rcv+0x1c/0x20 [ 1306.744795][T10187] netlink_unicast+0x589/0x650 [ 1306.749578][T10187] netlink_sendmsg+0x66e/0x770 [ 1306.754420][T10187] ? netlink_getsockopt+0x3e0/0x3e0 [ 1306.759622][T10187] ____sys_sendmsg+0x37c/0x4d0 [ 1306.764391][T10187] __sys_sendmsg+0x1e9/0x270 [ 1306.769003][T10187] __x64_sys_sendmsg+0x46/0x50 [ 1306.773772][T10187] do_syscall_64+0x44/0x110 [ 1306.778311][T10187] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1306.784300][T10187] RIP: 0033:0x7efd2e8d0ce9 [ 1306.788716][T10187] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1306.808402][T10187] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1306.816826][T10187] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1306.824849][T10187] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1306.832825][T10187] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1306.840881][T10187] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1306.849007][T10187] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1306.856988][T10187] 03:20:32 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000480000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:32 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef01ac00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1306.945766][T10203] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1306.965899][T10203] wireguard12: entered promiscuous mode [ 1306.971515][T10203] wireguard12: entered allmulticast mode [ 1307.001088][T10205] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1307.036612][T10205] wireguard15: entered promiscuous mode [ 1307.042216][T10205] wireguard15: entered allmulticast mode 03:20:32 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf14a96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:32 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000003480000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 90) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:32 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef03ac00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:32 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xfffffffb, 0x0, 0x0, 0x0) mlockall(0x0) [ 1307.211647][T10213] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:20:32 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x3000)=nil, 0x4000) (async) mlockall(0x1) (async) syz_clone(0x20040000, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000000)="0d1e0012175f1684a2ffe7275ec492458af7123e84542afee09a15b7d36d1c4956c3e0af9c62de0a931c781e416113af1005a18947de22355e59bebe05c8d08984f4032929768541fc64e43098b87d65325842a4f6a72cb5b0d1caaa0a3ad234996329b23479ef9426e4282099b02fe39dda04a8b57dfc7f2c17dbd6aa714616a3b3bd701a73708c2e") [ 1307.257645][T10213] wireguard12: entered promiscuous mode [ 1307.263244][T10213] wireguard12: entered allmulticast mode [ 1307.282691][T10216] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1307.310959][T10216] wireguard15: entered promiscuous mode [ 1307.316577][T10216] wireguard15: entered allmulticast mode [ 1307.336870][T10219] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1307.346136][T10219] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1307.357399][T10219] FAULT_INJECTION: forcing a failure. [ 1307.357399][T10219] name failslab, interval 1, probability 0, space 0, times 0 [ 1307.370006][T10219] CPU: 0 PID: 10219 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1307.380486][T10219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1307.390591][T10219] Call Trace: [ 1307.393871][T10219] [ 1307.396849][T10219] dump_stack_lvl+0xda/0x130 [ 1307.401535][T10219] dump_stack+0x15/0x20 [ 1307.405700][T10219] should_fail_ex+0x21f/0x230 [ 1307.410391][T10219] ? __kernfs_new_node+0x6a/0x380 [ 1307.415523][T10219] __should_failslab+0x92/0xa0 [ 1307.420538][T10219] should_failslab+0x9/0x20 [ 1307.425044][T10219] kmem_cache_alloc+0x4e/0x250 [ 1307.429875][T10219] __kernfs_new_node+0x6a/0x380 [ 1307.434735][T10219] ? rb_insert_color+0x280/0x290 [ 1307.439681][T10219] ? up_write+0x30/0xe0 [ 1307.443895][T10219] ? kernfs_activate+0x252/0x270 [ 1307.448862][T10219] kernfs_new_node+0x5f/0xd0 [ 1307.453468][T10219] __kernfs_create_file+0x49/0x180 [ 1307.458596][T10219] ? dev_attr_show+0x90/0x90 [ 1307.463197][T10219] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1307.468727][T10219] internal_create_group+0x2e4/0x800 [ 1307.474151][T10219] sysfs_create_groups+0x3c/0xe0 [ 1307.479175][T10219] device_add_attrs+0xf5/0x400 [ 1307.483954][T10219] ? kobject_put+0xd8/0x160 [ 1307.488532][T10219] device_add+0x431/0x8b0 [ 1307.492915][T10219] netdev_register_kobject+0xfc/0x230 [ 1307.498387][T10219] register_netdevice+0x86f/0xd60 [ 1307.503423][T10219] ? mutex_lock+0xd/0x30 [ 1307.507749][T10219] wg_newlink+0x3b2/0x580 [ 1307.512087][T10219] ? wg_setup+0x1d0/0x1d0 [ 1307.516480][T10219] rtnl_newlink+0xee5/0x1670 [ 1307.521174][T10219] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1307.527492][T10219] ? _raw_spin_unlock+0x26/0x40 [ 1307.532345][T10219] ? __mutex_lock+0x21c/0x8d0 [ 1307.537129][T10219] ? rtnl_setlink+0x300/0x300 [ 1307.541944][T10219] rtnetlink_rcv_msg+0x807/0x8c0 [ 1307.546890][T10219] ? sysvec_apic_timer_interrupt+0x42/0x80 [ 1307.552706][T10219] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1307.558917][T10219] ? slab_post_alloc_hook+0x82/0x2f0 [ 1307.564244][T10219] ? kmem_cache_free+0x1d9/0x380 [ 1307.569185][T10219] ? __kfree_skb+0x104/0x140 [ 1307.573817][T10219] ? nlmon_xmit+0x4b/0x60 [ 1307.578224][T10219] ? __kfree_skb+0x104/0x140 [ 1307.582814][T10219] ? consume_skb+0x57/0x180 [ 1307.587353][T10219] ? nlmon_xmit+0x4b/0x60 [ 1307.591688][T10219] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1307.596991][T10219] ? __dev_queue_xmit+0xaae/0x1d80 [ 1307.602117][T10219] ? ref_tracker_free+0x3a1/0x400 [ 1307.607218][T10219] netlink_rcv_skb+0x126/0x220 [ 1307.611984][T10219] ? rtnetlink_bind+0x60/0x60 [ 1307.616664][T10219] rtnetlink_rcv+0x1c/0x20 [ 1307.621083][T10219] netlink_unicast+0x589/0x650 [ 1307.625920][T10219] netlink_sendmsg+0x66e/0x770 [ 1307.630724][T10219] ? netlink_getsockopt+0x3e0/0x3e0 [ 1307.635935][T10219] ____sys_sendmsg+0x37c/0x4d0 [ 1307.640783][T10219] __sys_sendmsg+0x1e9/0x270 [ 1307.645385][T10219] __x64_sys_sendmsg+0x46/0x50 [ 1307.650191][T10219] do_syscall_64+0x44/0x110 [ 1307.654816][T10219] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1307.660723][T10219] RIP: 0033:0x7efd2e8d0ce9 [ 1307.665140][T10219] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1307.687007][T10219] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1307.695417][T10219] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1307.703442][T10219] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1307.711412][T10219] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1307.719385][T10219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1307.727357][T10219] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1307.735327][T10219] 03:20:32 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000004c0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:32 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf15a96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:32 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef03b600000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1307.873718][T10237] wireguard12: entered promiscuous mode [ 1307.879297][T10237] wireguard12: entered allmulticast mode [ 1307.904762][T10240] wireguard15: entered promiscuous mode [ 1307.910342][T10240] wireguard15: entered allmulticast mode 03:20:33 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 91) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:33 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000002500000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:33 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00bd00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:33 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x7fd071e38fff, 0x0, 0x0, 0x0) mlockall(0x0) [ 1308.114352][T10250] wireguard12: entered promiscuous mode [ 1308.119938][T10250] wireguard12: entered allmulticast mode [ 1308.207092][T10253] wireguard15: entered promiscuous mode [ 1308.212680][T10253] wireguard15: entered allmulticast mode [ 1308.293364][T10254] FAULT_INJECTION: forcing a failure. [ 1308.293364][T10254] name failslab, interval 1, probability 0, space 0, times 0 [ 1308.306166][T10254] CPU: 1 PID: 10254 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1308.316612][T10254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1308.326709][T10254] Call Trace: [ 1308.330043][T10254] [ 1308.332972][T10254] dump_stack_lvl+0xda/0x130 [ 1308.337594][T10254] dump_stack+0x15/0x20 [ 1308.341761][T10254] should_fail_ex+0x21f/0x230 [ 1308.346450][T10254] ? __kernfs_new_node+0x6a/0x380 [ 1308.351481][T10254] __should_failslab+0x92/0xa0 [ 1308.356337][T10254] should_failslab+0x9/0x20 [ 1308.360904][T10254] kmem_cache_alloc+0x4e/0x250 [ 1308.365691][T10254] __kernfs_new_node+0x6a/0x380 [ 1308.370619][T10254] ? rb_insert_color+0x280/0x290 [ 1308.375686][T10254] ? up_write+0x30/0xe0 [ 1308.379842][T10254] ? kernfs_activate+0x252/0x270 [ 1308.384836][T10254] kernfs_new_node+0x5f/0xd0 [ 1308.389428][T10254] __kernfs_create_file+0x49/0x180 [ 1308.394613][T10254] ? dev_attr_show+0x90/0x90 [ 1308.399262][T10254] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1308.404688][T10254] internal_create_group+0x2e4/0x800 [ 1308.410025][T10254] sysfs_create_groups+0x3c/0xe0 [ 1308.414970][T10254] device_add_attrs+0xf5/0x400 [ 1308.419752][T10254] ? kobject_put+0xd8/0x160 [ 1308.424316][T10254] device_add+0x431/0x8b0 [ 1308.428655][T10254] netdev_register_kobject+0xfc/0x230 [ 1308.434037][T10254] register_netdevice+0x86f/0xd60 [ 1308.439122][T10254] ? mutex_lock+0xd/0x30 [ 1308.443435][T10254] wg_newlink+0x3b2/0x580 [ 1308.447794][T10254] ? wg_setup+0x1d0/0x1d0 [ 1308.452191][T10254] rtnl_newlink+0xee5/0x1670 [ 1308.456867][T10254] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1308.463116][T10254] ? _raw_spin_unlock+0x26/0x40 [ 1308.468012][T10254] ? __mutex_lock+0x21c/0x8d0 [ 1308.472733][T10254] ? rtnl_setlink+0x300/0x300 [ 1308.477564][T10254] rtnetlink_rcv_msg+0x807/0x8c0 [ 1308.482507][T10254] ? memcg_list_lru_alloc+0xd5/0x750 [ 1308.487811][T10254] ? mod_objcg_state+0x357/0x580 [ 1308.492778][T10254] ? slab_post_alloc_hook+0x82/0x2f0 [ 1308.498107][T10254] ? kmem_cache_free+0x1d9/0x380 [ 1308.503057][T10254] ? __kfree_skb+0x104/0x140 [ 1308.507777][T10254] ? nlmon_xmit+0x4b/0x60 [ 1308.512111][T10254] ? __kfree_skb+0x104/0x140 [ 1308.516698][T10254] ? consume_skb+0x57/0x180 [ 1308.521199][T10254] ? nlmon_xmit+0x4b/0x60 [ 1308.525582][T10254] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1308.530871][T10254] ? __dev_queue_xmit+0xaae/0x1d80 [ 1308.536040][T10254] ? ref_tracker_free+0x3a1/0x400 03:20:33 executing program 4: shmctl$IPC_RMID(0x0, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x3000)=nil, 0x4000) (async) shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x3000)=nil, 0x4000) mlockall(0x1) syz_clone(0x20040000, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000000)="0d1e0012175f1684a2ffe7275ec492458af7123e84542afee09a15b7d36d1c4956c3e0af9c62de0a931c781e416113af1005a18947de22355e59bebe05c8d08984f4032929768541fc64e43098b87d65325842a4f6a72cb5b0d1caaa0a3ad234996329b23479ef9426e4282099b02fe39dda04a8b57dfc7f2c17dbd6aa714616a3b3bd701a73708c2e") [ 1308.541108][T10254] netlink_rcv_skb+0x126/0x220 [ 1308.545868][T10254] ? rtnetlink_bind+0x60/0x60 [ 1308.550631][T10254] rtnetlink_rcv+0x1c/0x20 [ 1308.555181][T10254] netlink_unicast+0x589/0x650 [ 1308.559952][T10254] netlink_sendmsg+0x66e/0x770 [ 1308.564752][T10254] ? netlink_getsockopt+0x3e0/0x3e0 [ 1308.570017][T10254] ____sys_sendmsg+0x37c/0x4d0 [ 1308.574785][T10254] __sys_sendmsg+0x1e9/0x270 [ 1308.579382][T10254] __x64_sys_sendmsg+0x46/0x50 [ 1308.584149][T10254] do_syscall_64+0x44/0x110 [ 1308.588706][T10254] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1308.594633][T10254] RIP: 0033:0x7efd2e8d0ce9 [ 1308.599054][T10254] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1308.618710][T10254] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1308.627123][T10254] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1308.635155][T10254] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1308.643144][T10254] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1308.651186][T10254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1308.659158][T10254] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1308.667134][T10254] 03:20:33 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000560000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:33 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef01c200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:33 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf16a96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1308.794156][T10265] wireguard12: entered promiscuous mode [ 1308.799772][T10265] wireguard12: entered allmulticast mode 03:20:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 92) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1308.893796][T10269] wireguard15: entered promiscuous mode [ 1308.899399][T10269] wireguard15: entered allmulticast mode 03:20:34 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000035c0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1309.157577][T10278] FAULT_INJECTION: forcing a failure. [ 1309.157577][T10278] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.170386][T10278] CPU: 1 PID: 10278 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1309.180837][T10278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1309.190893][T10278] Call Trace: [ 1309.194170][T10278] [ 1309.197106][T10278] dump_stack_lvl+0xda/0x130 [ 1309.201788][T10278] dump_stack+0x15/0x20 [ 1309.206146][T10278] should_fail_ex+0x21f/0x230 [ 1309.210847][T10278] ? __kernfs_new_node+0x6a/0x380 [ 1309.215956][T10278] __should_failslab+0x92/0xa0 [ 1309.220790][T10278] should_failslab+0x9/0x20 [ 1309.225333][T10278] kmem_cache_alloc+0x4e/0x250 [ 1309.230103][T10278] __kernfs_new_node+0x6a/0x380 [ 1309.235036][T10278] ? rb_insert_color+0x263/0x290 [ 1309.239983][T10278] ? up_write+0x30/0xe0 [ 1309.244145][T10278] ? kernfs_activate+0x252/0x270 [ 1309.249098][T10278] kernfs_new_node+0x5f/0xd0 [ 1309.253695][T10278] __kernfs_create_file+0x49/0x180 [ 1309.258888][T10278] ? dev_attr_show+0x90/0x90 [ 1309.263474][T10278] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1309.268873][T10278] internal_create_group+0x2e4/0x800 [ 1309.274166][T10278] sysfs_create_groups+0x3c/0xe0 [ 1309.279186][T10278] device_add_attrs+0xf5/0x400 [ 1309.283955][T10278] ? kobject_put+0xd8/0x160 [ 1309.288496][T10278] device_add+0x431/0x8b0 [ 1309.292851][T10278] netdev_register_kobject+0xfc/0x230 [ 1309.298288][T10278] register_netdevice+0x86f/0xd60 [ 1309.303416][T10278] ? mutex_lock+0xd/0x30 [ 1309.307699][T10278] wg_newlink+0x3b2/0x580 [ 1309.312050][T10278] ? wg_setup+0x1d0/0x1d0 [ 1309.316446][T10278] rtnl_newlink+0xee5/0x1670 [ 1309.321061][T10278] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1309.327380][T10278] ? _raw_spin_unlock+0x26/0x40 [ 1309.332233][T10278] ? __mutex_lock+0x21c/0x8d0 [ 1309.336932][T10278] ? rtnl_setlink+0x300/0x300 [ 1309.341646][T10278] rtnetlink_rcv_msg+0x807/0x8c0 [ 1309.346594][T10278] ? __rcu_read_unlock+0x4d/0x70 [ 1309.351583][T10278] ? __rcu_read_unlock+0x4d/0x70 [ 1309.356556][T10278] ? __refill_stock+0x7f/0xb0 [ 1309.361316][T10278] ? kmem_cache_free+0x1d9/0x380 [ 1309.366336][T10278] ? __kfree_skb+0x104/0x140 [ 1309.370926][T10278] ? nlmon_xmit+0x4b/0x60 [ 1309.375300][T10278] ? __kfree_skb+0x104/0x140 [ 1309.379894][T10278] ? consume_skb+0x57/0x180 [ 1309.384465][T10278] ? nlmon_xmit+0x4b/0x60 [ 1309.388799][T10278] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1309.394127][T10278] ? __dev_queue_xmit+0xaae/0x1d80 [ 1309.399324][T10278] ? ref_tracker_free+0x3a1/0x400 [ 1309.404431][T10278] netlink_rcv_skb+0x126/0x220 [ 1309.409195][T10278] ? rtnetlink_bind+0x60/0x60 [ 1309.413934][T10278] rtnetlink_rcv+0x1c/0x20 [ 1309.418354][T10278] netlink_unicast+0x589/0x650 [ 1309.423197][T10278] netlink_sendmsg+0x66e/0x770 [ 1309.427965][T10278] ? netlink_getsockopt+0x3e0/0x3e0 [ 1309.433228][T10278] ____sys_sendmsg+0x37c/0x4d0 [ 1309.437997][T10278] __sys_sendmsg+0x1e9/0x270 [ 1309.442596][T10278] __x64_sys_sendmsg+0x46/0x50 [ 1309.447367][T10278] do_syscall_64+0x44/0x110 [ 1309.451876][T10278] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1309.457840][T10278] RIP: 0033:0x7efd2e8d0ce9 [ 1309.462256][T10278] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1309.481869][T10278] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1309.490278][T10278] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1309.498278][T10278] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1309.506253][T10278] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1309.514223][T10278] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1309.522194][T10278] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1309.530311][T10278] 03:20:34 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef02c400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1309.563740][T10282] wireguard12: entered promiscuous mode [ 1309.569396][T10282] wireguard12: entered allmulticast mode 03:20:34 executing program 4: shmctl$IPC_RMID(0x0, 0x0) shmget$private(0x0, 0x2000, 0x200, &(0x7f0000ffd000/0x2000)=nil) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 1309.685715][T10287] wireguard15: entered promiscuous mode [ 1309.691337][T10287] wireguard15: entered allmulticast mode 03:20:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 93) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:34 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000600000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:35 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef02c600000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1309.879688][T10298] FAULT_INJECTION: forcing a failure. [ 1309.879688][T10298] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.892440][T10298] CPU: 1 PID: 10298 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1309.902897][T10298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1309.913033][T10298] Call Trace: [ 1309.916363][T10298] [ 1309.919329][T10298] dump_stack_lvl+0xda/0x130 [ 1309.924041][T10298] dump_stack+0x15/0x20 [ 1309.928213][T10298] should_fail_ex+0x21f/0x230 [ 1309.932909][T10298] ? __kernfs_new_node+0x6a/0x380 [ 1309.937942][T10298] __should_failslab+0x92/0xa0 [ 1309.942737][T10298] should_failslab+0x9/0x20 [ 1309.947241][T10298] kmem_cache_alloc+0x4e/0x250 [ 1309.952052][T10298] __kernfs_new_node+0x6a/0x380 [ 1309.956932][T10298] ? rb_insert_color+0x263/0x290 [ 1309.961931][T10298] ? up_write+0x30/0xe0 [ 1309.966082][T10298] ? kernfs_activate+0x252/0x270 [ 1309.971018][T10298] kernfs_new_node+0x5f/0xd0 [ 1309.975618][T10298] __kernfs_create_file+0x49/0x180 [ 1309.980796][T10298] ? dev_attr_show+0x90/0x90 [ 1309.985419][T10298] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1309.990907][T10298] internal_create_group+0x2e4/0x800 [ 1309.996263][T10298] sysfs_create_groups+0x3c/0xe0 [ 1310.001272][T10298] device_add_attrs+0xf5/0x400 [ 1310.006200][T10298] ? kobject_put+0xd8/0x160 [ 1310.010711][T10298] device_add+0x431/0x8b0 [ 1310.015051][T10298] netdev_register_kobject+0xfc/0x230 [ 1310.020510][T10298] register_netdevice+0x86f/0xd60 [ 1310.025608][T10298] ? mutex_lock+0xd/0x30 [ 1310.029856][T10298] wg_newlink+0x3b2/0x580 [ 1310.034256][T10298] ? wg_setup+0x1d0/0x1d0 [ 1310.038592][T10298] rtnl_newlink+0xee5/0x1670 [ 1310.043194][T10298] ? __mutex_lock+0x54/0x8d0 [ 1310.047842][T10298] ? rtnl_setlink+0x300/0x300 [ 1310.052569][T10298] rtnetlink_rcv_msg+0x807/0x8c0 [ 1310.057540][T10298] ? memcg_list_lru_alloc+0xd5/0x750 [ 1310.062884][T10298] ? mod_objcg_state+0x357/0x580 [ 1310.067854][T10298] ? slab_post_alloc_hook+0x82/0x2f0 [ 1310.073218][T10298] ? kmem_cache_free+0x1d9/0x380 [ 1310.078240][T10298] ? __kfree_skb+0x104/0x140 [ 1310.082890][T10298] ? nlmon_xmit+0x4b/0x60 [ 1310.087225][T10298] ? __kfree_skb+0x104/0x140 [ 1310.091891][T10298] ? consume_skb+0x57/0x180 [ 1310.096448][T10298] ? nlmon_xmit+0x4b/0x60 [ 1310.100832][T10298] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1310.106132][T10298] ? __dev_queue_xmit+0xaae/0x1d80 [ 1310.111314][T10298] ? ref_tracker_free+0x3a1/0x400 [ 1310.116387][T10298] netlink_rcv_skb+0x126/0x220 [ 1310.121157][T10298] ? rtnetlink_bind+0x60/0x60 [ 1310.125840][T10298] rtnetlink_rcv+0x1c/0x20 [ 1310.130280][T10298] netlink_unicast+0x589/0x650 [ 1310.135058][T10298] netlink_sendmsg+0x66e/0x770 [ 1310.139826][T10298] ? netlink_getsockopt+0x3e0/0x3e0 [ 1310.145021][T10298] ____sys_sendmsg+0x37c/0x4d0 [ 1310.149846][T10298] __sys_sendmsg+0x1e9/0x270 [ 1310.154488][T10298] __x64_sys_sendmsg+0x46/0x50 [ 1310.159328][T10298] do_syscall_64+0x44/0x110 [ 1310.163843][T10298] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1310.169763][T10298] RIP: 0033:0x7efd2e8d0ce9 [ 1310.174249][T10298] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1310.193923][T10298] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1310.202511][T10298] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1310.210480][T10298] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1310.218479][T10298] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1310.226574][T10298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1310.234546][T10298] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1310.242517][T10298] 03:20:35 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x2001000000000, 0x0, 0x0, 0x0) mlockall(0x0) [ 1310.271964][T10297] wireguard12: entered promiscuous mode [ 1310.277616][T10297] wireguard12: entered allmulticast mode [ 1310.343417][T10301] wireguard15: entered promiscuous mode [ 1310.349158][T10301] wireguard15: entered allmulticast mode 03:20:35 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000001620000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:35 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00c800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1310.517990][T10312] wireguard12: entered promiscuous mode [ 1310.523657][T10312] wireguard12: entered allmulticast mode [ 1310.586496][T10315] wireguard15: entered promiscuous mode [ 1310.592085][T10315] wireguard15: entered allmulticast mode 03:20:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 94) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1310.740320][T10320] FAULT_INJECTION: forcing a failure. [ 1310.740320][T10320] name failslab, interval 1, probability 0, space 0, times 0 [ 1310.753068][T10320] CPU: 0 PID: 10320 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1310.763558][T10320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1310.773617][T10320] Call Trace: [ 1310.776891][T10320] [ 1310.779818][T10320] dump_stack_lvl+0xda/0x130 [ 1310.784483][T10320] dump_stack+0x15/0x20 [ 1310.788663][T10320] should_fail_ex+0x21f/0x230 [ 1310.793439][T10320] ? __kernfs_new_node+0x6a/0x380 [ 1310.798474][T10320] __should_failslab+0x92/0xa0 [ 1310.803335][T10320] should_failslab+0x9/0x20 [ 1310.807890][T10320] kmem_cache_alloc+0x4e/0x250 [ 1310.812743][T10320] __kernfs_new_node+0x6a/0x380 [ 1310.817641][T10320] ? rb_insert_color+0x6a/0x290 [ 1310.822537][T10320] ? up_write+0x30/0xe0 [ 1310.826751][T10320] ? kernfs_activate+0x252/0x270 [ 1310.831684][T10320] kernfs_new_node+0x5f/0xd0 [ 1310.836279][T10320] __kernfs_create_file+0x49/0x180 [ 1310.841485][T10320] ? dev_attr_show+0x90/0x90 [ 1310.846075][T10320] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1310.851524][T10320] internal_create_group+0x2e4/0x800 [ 1310.856877][T10320] sysfs_create_groups+0x3c/0xe0 [ 1310.861843][T10320] device_add_attrs+0xf5/0x400 [ 1310.866615][T10320] ? kobject_put+0xd8/0x160 [ 1310.871195][T10320] device_add+0x431/0x8b0 [ 1310.875540][T10320] netdev_register_kobject+0xfc/0x230 [ 1310.880998][T10320] register_netdevice+0x86f/0xd60 [ 1310.886080][T10320] ? mutex_lock+0xd/0x30 [ 1310.890429][T10320] wg_newlink+0x3b2/0x580 [ 1310.894802][T10320] ? wg_setup+0x1d0/0x1d0 [ 1310.899132][T10320] rtnl_newlink+0xee5/0x1670 [ 1310.903737][T10320] ? security_capable+0x5e/0x80 [ 1310.908587][T10320] ? ns_capable+0x7c/0xb0 [ 1310.912996][T10320] ? rtnl_setlink+0x300/0x300 [ 1310.917686][T10320] rtnetlink_rcv_msg+0x807/0x8c0 [ 1310.922631][T10320] ? memcg_list_lru_alloc+0xd5/0x750 [ 1310.927968][T10320] ? mod_objcg_state+0x357/0x580 [ 1310.933046][T10320] ? slab_post_alloc_hook+0x82/0x2f0 [ 1310.938378][T10320] ? kmem_cache_free+0x1d9/0x380 [ 1310.943322][T10320] ? __kfree_skb+0x104/0x140 [ 1310.947944][T10320] ? nlmon_xmit+0x4b/0x60 [ 1310.952281][T10320] ? __kfree_skb+0x104/0x140 [ 1310.956872][T10320] ? consume_skb+0x57/0x180 [ 1310.961374][T10320] ? nlmon_xmit+0x4b/0x60 [ 1310.965707][T10320] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1310.971073][T10320] ? __dev_queue_xmit+0xaae/0x1d80 [ 1310.976233][T10320] ? ref_tracker_free+0x3a1/0x400 [ 1310.981264][T10320] netlink_rcv_skb+0x126/0x220 [ 1310.986091][T10320] ? rtnetlink_bind+0x60/0x60 [ 1310.990797][T10320] rtnetlink_rcv+0x1c/0x20 [ 1310.995211][T10320] netlink_unicast+0x589/0x650 [ 1311.000066][T10320] netlink_sendmsg+0x66e/0x770 [ 1311.004908][T10320] ? netlink_getsockopt+0x3e0/0x3e0 [ 1311.010106][T10320] ____sys_sendmsg+0x37c/0x4d0 [ 1311.014871][T10320] __sys_sendmsg+0x1e9/0x270 [ 1311.019503][T10320] __x64_sys_sendmsg+0x46/0x50 [ 1311.024273][T10320] do_syscall_64+0x44/0x110 [ 1311.028787][T10320] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1311.034686][T10320] RIP: 0033:0x7efd2e8d0ce9 [ 1311.039180][T10320] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1311.058793][T10320] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1311.067233][T10320] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1311.075258][T10320] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1311.083297][T10320] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1311.091275][T10320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1311.099286][T10320] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1311.107261][T10320] 03:20:36 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf17a96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:36 executing program 4: shmctl$IPC_RMID(0x0, 0x0) shmget$private(0x0, 0x2000, 0x200, &(0x7f0000ffd000/0x2000)=nil) (async, rerun: 32) mlockall(0x1) (async, rerun: 32) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:20:36 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000058650000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:36 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef03ce00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1311.218468][T10329] wireguard12: entered promiscuous mode [ 1311.224107][T10329] wireguard12: entered allmulticast mode [ 1311.266532][T10328] wireguard15: entered promiscuous mode [ 1311.272130][T10328] wireguard15: entered allmulticast mode 03:20:36 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x2020000000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:20:36 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000003660000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:36 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00d800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:36 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf18a96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1311.419347][T10342] __nla_validate_parse: 22 callbacks suppressed [ 1311.419360][T10342] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1311.458666][T10342] wireguard12: entered promiscuous mode [ 1311.464411][T10342] wireguard12: entered allmulticast mode 03:20:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 95) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1311.497409][T10346] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1311.568983][T10346] wireguard15: entered promiscuous mode [ 1311.574606][T10346] wireguard15: entered allmulticast mode [ 1311.669963][T10356] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1311.679220][T10356] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1311.694675][T10356] FAULT_INJECTION: forcing a failure. [ 1311.694675][T10356] name failslab, interval 1, probability 0, space 0, times 0 [ 1311.707383][T10356] CPU: 1 PID: 10356 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1311.717872][T10356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1311.727984][T10356] Call Trace: [ 1311.731267][T10356] [ 1311.734195][T10356] dump_stack_lvl+0xda/0x130 [ 1311.738803][T10356] dump_stack+0x15/0x20 [ 1311.742984][T10356] should_fail_ex+0x21f/0x230 [ 1311.747691][T10356] ? __kernfs_new_node+0x6a/0x380 [ 1311.752714][T10356] __should_failslab+0x92/0xa0 [ 1311.757531][T10356] should_failslab+0x9/0x20 [ 1311.762034][T10356] kmem_cache_alloc+0x4e/0x250 03:20:36 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000680000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1311.766798][T10356] __kernfs_new_node+0x6a/0x380 [ 1311.771656][T10356] ? rb_insert_color+0x6a/0x290 [ 1311.776515][T10356] ? up_write+0x30/0xe0 [ 1311.780670][T10356] ? kernfs_activate+0x252/0x270 [ 1311.785616][T10356] kernfs_new_node+0x5f/0xd0 [ 1311.790290][T10356] __kernfs_create_file+0x49/0x180 [ 1311.795405][T10356] ? dev_attr_show+0x90/0x90 [ 1311.799996][T10356] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1311.805483][T10356] internal_create_group+0x2e4/0x800 [ 1311.810778][T10356] sysfs_create_groups+0x3c/0xe0 [ 1311.815718][T10356] device_add_attrs+0xf5/0x400 [ 1311.820575][T10356] ? kobject_put+0xd8/0x160 [ 1311.825095][T10356] device_add+0x431/0x8b0 [ 1311.829513][T10356] netdev_register_kobject+0xfc/0x230 [ 1311.834920][T10356] register_netdevice+0x86f/0xd60 [ 1311.839981][T10356] ? mutex_lock+0xd/0x30 [ 1311.844229][T10356] wg_newlink+0x3b2/0x580 [ 1311.848647][T10356] ? wg_setup+0x1d0/0x1d0 [ 1311.852981][T10356] rtnl_newlink+0xee5/0x1670 [ 1311.857766][T10356] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1311.864056][T10356] ? _raw_spin_unlock+0x26/0x40 [ 1311.868909][T10356] ? __mutex_lock+0x21c/0x8d0 [ 1311.873671][T10356] ? rtnl_setlink+0x300/0x300 [ 1311.878351][T10356] rtnetlink_rcv_msg+0x807/0x8c0 [ 1311.883292][T10356] ? memcg_list_lru_alloc+0xd5/0x750 [ 1311.888653][T10356] ? mod_objcg_state+0x357/0x580 [ 1311.893599][T10356] ? slab_post_alloc_hook+0x82/0x2f0 [ 1311.898971][T10356] ? kmem_cache_free+0x1d9/0x380 [ 1311.903984][T10356] ? __kfree_skb+0x104/0x140 [ 1311.908577][T10356] ? nlmon_xmit+0x4b/0x60 [ 1311.912905][T10356] ? __kfree_skb+0x104/0x140 [ 1311.917546][T10356] ? consume_skb+0x57/0x180 [ 1311.922102][T10356] ? nlmon_xmit+0x4b/0x60 [ 1311.926493][T10356] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1311.931844][T10356] ? __dev_queue_xmit+0xaae/0x1d80 [ 1311.937136][T10356] ? ref_tracker_free+0x3a1/0x400 [ 1311.942158][T10356] netlink_rcv_skb+0x126/0x220 [ 1311.946999][T10356] ? rtnetlink_bind+0x60/0x60 [ 1311.951751][T10356] rtnetlink_rcv+0x1c/0x20 [ 1311.956166][T10356] netlink_unicast+0x589/0x650 [ 1311.960975][T10356] netlink_sendmsg+0x66e/0x770 [ 1311.965745][T10356] ? netlink_getsockopt+0x3e0/0x3e0 [ 1311.970952][T10356] ____sys_sendmsg+0x37c/0x4d0 [ 1311.975765][T10356] __sys_sendmsg+0x1e9/0x270 [ 1311.980360][T10356] __x64_sys_sendmsg+0x46/0x50 [ 1311.985131][T10356] do_syscall_64+0x44/0x110 [ 1311.989713][T10356] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1311.995648][T10356] RIP: 0033:0x7efd2e8d0ce9 [ 1312.000130][T10356] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1312.019839][T10356] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1312.028332][T10356] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1312.036389][T10356] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1312.044371][T10356] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1312.052346][T10356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1312.060315][T10356] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1312.068366][T10356] 03:20:37 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0ada00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1312.126474][T10361] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1312.168487][T10361] wireguard12: entered promiscuous mode [ 1312.174161][T10361] wireguard12: entered allmulticast mode [ 1312.243682][T10365] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1312.315534][T10365] wireguard15: entered promiscuous mode [ 1312.321160][T10365] wireguard15: entered allmulticast mode 03:20:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 96) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:37 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000006c0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:37 executing program 4: shmctl$IPC_RMID(0x0, 0x0) shmget$private(0x0, 0x2000, 0x200, &(0x7f0000ffd000/0x2000)=nil) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) shmctl$IPC_RMID(0x0, 0x0) (async) shmget$private(0x0, 0x2000, 0x200, &(0x7f0000ffd000/0x2000)=nil) (async) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) (async) 03:20:37 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef03e000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1312.521270][T10374] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1312.580868][T10374] wireguard12: entered promiscuous mode [ 1312.586543][T10374] wireguard12: entered allmulticast mode [ 1312.624741][T10375] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1312.634017][T10375] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1312.644085][T10375] FAULT_INJECTION: forcing a failure. [ 1312.644085][T10375] name failslab, interval 1, probability 0, space 0, times 0 [ 1312.656695][T10375] CPU: 0 PID: 10375 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1312.667262][T10375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1312.677312][T10375] Call Trace: [ 1312.680589][T10375] [ 1312.683519][T10375] dump_stack_lvl+0xda/0x130 [ 1312.688167][T10375] dump_stack+0x15/0x20 [ 1312.692388][T10375] should_fail_ex+0x21f/0x230 [ 1312.697111][T10375] ? __kernfs_new_node+0x6a/0x380 [ 1312.702187][T10375] __should_failslab+0x92/0xa0 [ 1312.706990][T10375] should_failslab+0x9/0x20 [ 1312.711553][T10375] kmem_cache_alloc+0x4e/0x250 [ 1312.716328][T10375] __kernfs_new_node+0x6a/0x380 [ 1312.721190][T10375] ? rb_insert_color+0x6a/0x290 [ 1312.726110][T10375] ? up_write+0x30/0xe0 [ 1312.730269][T10375] ? kernfs_activate+0x252/0x270 [ 1312.735205][T10375] kernfs_new_node+0x5f/0xd0 [ 1312.739879][T10375] __kernfs_create_file+0x49/0x180 [ 1312.744998][T10375] ? dev_attr_show+0x90/0x90 [ 1312.749592][T10375] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1312.755043][T10375] internal_create_group+0x2e4/0x800 [ 1312.760334][T10375] sysfs_create_groups+0x3c/0xe0 [ 1312.765282][T10375] device_add_attrs+0xf5/0x400 [ 1312.770129][T10375] ? kobject_put+0xd8/0x160 [ 1312.774690][T10375] device_add+0x431/0x8b0 [ 1312.779030][T10375] netdev_register_kobject+0xfc/0x230 [ 1312.784421][T10375] register_netdevice+0x86f/0xd60 [ 1312.789507][T10375] ? mutex_lock+0xd/0x30 [ 1312.793779][T10375] wg_newlink+0x3b2/0x580 [ 1312.798151][T10375] ? wg_setup+0x1d0/0x1d0 [ 1312.802511][T10375] rtnl_newlink+0xee5/0x1670 [ 1312.807175][T10375] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1312.813507][T10375] ? _raw_spin_unlock+0x26/0x40 [ 1312.818353][T10375] ? __mutex_lock+0x21c/0x8d0 [ 1312.823047][T10375] ? rtnl_setlink+0x300/0x300 [ 1312.827744][T10375] rtnetlink_rcv_msg+0x807/0x8c0 [ 1312.832679][T10375] ? memcg_list_lru_alloc+0xd5/0x750 [ 1312.838031][T10375] ? mod_objcg_state+0x357/0x580 [ 1312.843012][T10375] ? slab_post_alloc_hook+0x82/0x2f0 [ 1312.848365][T10375] ? kmem_cache_free+0x1d9/0x380 [ 1312.853420][T10375] ? __kfree_skb+0x104/0x140 [ 1312.858003][T10375] ? nlmon_xmit+0x4b/0x60 [ 1312.862325][T10375] ? __kfree_skb+0x104/0x140 [ 1312.866903][T10375] ? consume_skb+0x57/0x180 [ 1312.871393][T10375] ? nlmon_xmit+0x4b/0x60 [ 1312.875741][T10375] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1312.881095][T10375] ? __dev_queue_xmit+0xaae/0x1d80 [ 1312.886201][T10375] ? ref_tracker_free+0x3a1/0x400 [ 1312.891224][T10375] netlink_rcv_skb+0x126/0x220 [ 1312.895973][T10375] ? rtnetlink_bind+0x60/0x60 [ 1312.900642][T10375] rtnetlink_rcv+0x1c/0x20 [ 1312.905065][T10375] netlink_unicast+0x589/0x650 [ 1312.909954][T10375] netlink_sendmsg+0x66e/0x770 [ 1312.914703][T10375] ? netlink_getsockopt+0x3e0/0x3e0 [ 1312.919930][T10375] ____sys_sendmsg+0x37c/0x4d0 [ 1312.924687][T10375] __sys_sendmsg+0x1e9/0x270 [ 1312.929328][T10375] __x64_sys_sendmsg+0x46/0x50 [ 1312.934127][T10375] do_syscall_64+0x44/0x110 [ 1312.938681][T10375] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1312.944564][T10375] RIP: 0033:0x7efd2e8d0ce9 [ 1312.948966][T10375] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1312.968558][T10375] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1312.976956][T10375] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1312.984914][T10375] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1312.992871][T10375] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1313.000884][T10375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1313.008840][T10375] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1313.016868][T10375] 03:20:38 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x8000000000000, 0x0, 0x0, 0x0) mlockall(0x0) [ 1313.075089][T10379] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1313.097935][T10379] wireguard15: entered promiscuous mode [ 1313.103567][T10379] wireguard15: entered allmulticast mode 03:20:38 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000740000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:38 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef01e200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 97) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1313.256699][T10390] wireguard12: entered promiscuous mode [ 1313.262402][T10390] wireguard12: entered allmulticast mode [ 1313.325685][T10391] wireguard15: entered promiscuous mode [ 1313.331272][T10391] wireguard15: entered allmulticast mode [ 1313.417066][T10397] FAULT_INJECTION: forcing a failure. [ 1313.417066][T10397] name failslab, interval 1, probability 0, space 0, times 0 [ 1313.430234][T10397] CPU: 0 PID: 10397 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1313.440691][T10397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1313.450831][T10397] Call Trace: [ 1313.454112][T10397] [ 1313.457040][T10397] dump_stack_lvl+0xda/0x130 [ 1313.461733][T10397] dump_stack+0x15/0x20 [ 1313.465907][T10397] should_fail_ex+0x21f/0x230 [ 1313.470634][T10397] ? __kernfs_new_node+0x6a/0x380 [ 1313.475666][T10397] __should_failslab+0x92/0xa0 [ 1313.480445][T10397] should_failslab+0x9/0x20 [ 1313.484963][T10397] kmem_cache_alloc+0x4e/0x250 [ 1313.489740][T10397] __kernfs_new_node+0x6a/0x380 [ 1313.494591][T10397] ? rb_insert_color+0x6a/0x290 [ 1313.499443][T10397] ? up_write+0x30/0xe0 [ 1313.503604][T10397] ? kernfs_activate+0x252/0x270 [ 1313.508552][T10397] kernfs_new_node+0x5f/0xd0 [ 1313.513156][T10397] __kernfs_create_file+0x49/0x180 [ 1313.518275][T10397] ? dev_attr_show+0x90/0x90 [ 1313.522870][T10397] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1313.528284][T10397] internal_create_group+0x2e4/0x800 [ 1313.533675][T10397] sysfs_create_groups+0x3c/0xe0 [ 1313.538683][T10397] device_add_attrs+0xf5/0x400 [ 1313.543487][T10397] ? kobject_put+0xd8/0x160 [ 1313.548312][T10397] device_add+0x431/0x8b0 [ 1313.552672][T10397] netdev_register_kobject+0xfc/0x230 [ 1313.558099][T10397] register_netdevice+0x86f/0xd60 [ 1313.563213][T10397] ? mutex_lock+0xd/0x30 [ 1313.567507][T10397] wg_newlink+0x3b2/0x580 [ 1313.571851][T10397] ? wg_setup+0x1d0/0x1d0 [ 1313.576217][T10397] rtnl_newlink+0xee5/0x1670 [ 1313.580828][T10397] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1313.587140][T10397] ? _raw_spin_unlock+0x26/0x40 [ 1313.592008][T10397] ? __mutex_lock+0x21c/0x8d0 [ 1313.596732][T10397] ? rtnl_setlink+0x300/0x300 [ 1313.601420][T10397] rtnetlink_rcv_msg+0x807/0x8c0 [ 1313.606381][T10397] ? memcg_list_lru_alloc+0xd5/0x750 [ 1313.611686][T10397] ? mod_objcg_state+0x357/0x580 [ 1313.616648][T10397] ? sysvec_apic_timer_interrupt+0x42/0x80 [ 1313.622498][T10397] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1313.628662][T10397] ? kmem_cache_free+0x1d9/0x380 [ 1313.633648][T10397] ? __kfree_skb+0x104/0x140 [ 1313.638245][T10397] ? nlmon_xmit+0x4b/0x60 [ 1313.642571][T10397] ? __kfree_skb+0x104/0x140 [ 1313.647162][T10397] ? consume_skb+0x57/0x180 [ 1313.651691][T10397] ? nlmon_xmit+0x4b/0x60 [ 1313.656097][T10397] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1313.661404][T10397] ? __dev_queue_xmit+0xaae/0x1d80 [ 1313.666526][T10397] ? ref_tracker_free+0x3a1/0x400 [ 1313.671626][T10397] netlink_rcv_skb+0x126/0x220 [ 1313.676459][T10397] ? rtnetlink_bind+0x60/0x60 [ 1313.681173][T10397] rtnetlink_rcv+0x1c/0x20 [ 1313.685721][T10397] netlink_unicast+0x589/0x650 [ 1313.690500][T10397] netlink_sendmsg+0x66e/0x770 [ 1313.695370][T10397] ? netlink_getsockopt+0x3e0/0x3e0 [ 1313.700570][T10397] ____sys_sendmsg+0x37c/0x4d0 [ 1313.705341][T10397] __sys_sendmsg+0x1e9/0x270 [ 1313.710003][T10397] __x64_sys_sendmsg+0x46/0x50 [ 1313.714763][T10397] do_syscall_64+0x44/0x110 [ 1313.719302][T10397] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1313.725203][T10397] RIP: 0033:0x7efd2e8d0ce9 [ 1313.729629][T10397] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1313.749244][T10397] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1313.757668][T10397] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1313.765648][T10397] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1313.773660][T10397] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1313.781643][T10397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1313.789629][T10397] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1313.797675][T10397] 03:20:39 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf19a96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:39 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x8e00d100, &(0x7f0000000240)="dd9ace1ea30b49bf85b19def5b4b00cde44fa0d5768ddea3242feff8f0965437be0809bf5d82cd2866f6b774a652ac538478dc194c10f857d59c941b63034c84fd78dbf0d618b0b15a5fcc05f8955e9dda8274625e83b5b9b2690b01a2be0700000070aa85184f941cac52f76dbbc5ff315c28b0075fcb159e124904c84035eacd7d5b8ad4c0061ce9d242d99789be23c49831f762fcce823a6be7222d6aeab4f8a77d902ab83e9342e390f0839bca2e5c550513", 0xb4, 0x0, 0x0, &(0x7f00000000c0)="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") shmat(0xffffffffffffffff, &(0x7f0000ff3000/0xc000)=nil, 0x4000) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ff6000/0x3000)=nil) r0 = shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ff3000/0x4000)=nil) shmat(r0, &(0x7f0000ff9000/0x2000)=nil, 0x0) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) shmat(r1, &(0x7f0000ff5000/0x2000)=nil, 0x4000) mlockall(0x1) 03:20:39 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef02e400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:39 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00000f740000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:39 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x10100000000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:20:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 98) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1314.342487][T10411] wireguard12: entered promiscuous mode [ 1314.348301][T10411] wireguard12: entered allmulticast mode [ 1314.427020][T10409] wireguard15: entered promiscuous mode [ 1314.432616][T10409] wireguard15: entered allmulticast mode [ 1314.470100][T10417] FAULT_INJECTION: forcing a failure. [ 1314.470100][T10417] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.482754][T10417] CPU: 0 PID: 10417 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1314.493209][T10417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1314.503297][T10417] Call Trace: [ 1314.506567][T10417] [ 1314.509501][T10417] dump_stack_lvl+0xda/0x130 [ 1314.514105][T10417] dump_stack+0x15/0x20 [ 1314.518355][T10417] should_fail_ex+0x21f/0x230 [ 1314.523045][T10417] ? __kernfs_new_node+0x6a/0x380 [ 1314.528066][T10417] __should_failslab+0x92/0xa0 [ 1314.532916][T10417] should_failslab+0x9/0x20 [ 1314.537454][T10417] kmem_cache_alloc+0x4e/0x250 [ 1314.542299][T10417] __kernfs_new_node+0x6a/0x380 [ 1314.547260][T10417] ? rb_insert_color+0x6a/0x290 [ 1314.552179][T10417] ? up_write+0x30/0xe0 [ 1314.556342][T10417] ? kernfs_activate+0x252/0x270 [ 1314.561300][T10417] kernfs_new_node+0x5f/0xd0 [ 1314.565898][T10417] __kernfs_create_file+0x49/0x180 [ 1314.571079][T10417] ? dev_attr_show+0x90/0x90 [ 1314.575678][T10417] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1314.581054][T10417] internal_create_group+0x2e4/0x800 [ 1314.586400][T10417] sysfs_create_groups+0x3c/0xe0 [ 1314.591342][T10417] device_add_attrs+0xf5/0x400 [ 1314.596140][T10417] ? kobject_put+0xd8/0x160 [ 1314.600676][T10417] device_add+0x431/0x8b0 [ 1314.605123][T10417] netdev_register_kobject+0xfc/0x230 [ 1314.610570][T10417] register_netdevice+0x86f/0xd60 [ 1314.615660][T10417] ? mutex_lock+0xd/0x30 [ 1314.619908][T10417] wg_newlink+0x3b2/0x580 [ 1314.624311][T10417] ? wg_setup+0x1d0/0x1d0 [ 1314.628717][T10417] rtnl_newlink+0xee5/0x1670 [ 1314.633320][T10417] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1314.639567][T10417] ? _raw_spin_unlock+0x26/0x40 [ 1314.644473][T10417] ? __mutex_lock+0x21c/0x8d0 [ 1314.649269][T10417] ? rtnl_setlink+0x300/0x300 [ 1314.653959][T10417] rtnetlink_rcv_msg+0x807/0x8c0 [ 1314.658905][T10417] ? memcg_list_lru_alloc+0xd5/0x750 [ 1314.664206][T10417] ? mod_objcg_state+0x357/0x580 [ 1314.669154][T10417] ? slab_post_alloc_hook+0x82/0x2f0 [ 1314.674472][T10417] ? kmem_cache_free+0x1d9/0x380 [ 1314.679516][T10417] ? __kfree_skb+0x104/0x140 [ 1314.684115][T10417] ? nlmon_xmit+0x4b/0x60 [ 1314.688451][T10417] ? __kfree_skb+0x104/0x140 [ 1314.693043][T10417] ? consume_skb+0x57/0x180 [ 1314.697642][T10417] ? nlmon_xmit+0x4b/0x60 [ 1314.701969][T10417] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1314.707277][T10417] ? __dev_queue_xmit+0xaae/0x1d80 [ 1314.712389][T10417] ? ref_tracker_free+0x3a1/0x400 [ 1314.717496][T10417] netlink_rcv_skb+0x126/0x220 [ 1314.722323][T10417] ? rtnetlink_bind+0x60/0x60 [ 1314.727005][T10417] rtnetlink_rcv+0x1c/0x20 [ 1314.731416][T10417] netlink_unicast+0x589/0x650 [ 1314.736203][T10417] netlink_sendmsg+0x66e/0x770 [ 1314.741055][T10417] ? netlink_getsockopt+0x3e0/0x3e0 [ 1314.746255][T10417] ____sys_sendmsg+0x37c/0x4d0 [ 1314.751027][T10417] __sys_sendmsg+0x1e9/0x270 [ 1314.755632][T10417] __x64_sys_sendmsg+0x46/0x50 [ 1314.760539][T10417] do_syscall_64+0x44/0x110 [ 1314.765061][T10417] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1314.770967][T10417] RIP: 0033:0x7efd2e8d0ce9 [ 1314.775450][T10417] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1314.795129][T10417] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1314.803569][T10417] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1314.811537][T10417] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1314.819509][T10417] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1314.827475][T10417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1314.835472][T10417] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1314.844063][T10417] 03:20:40 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000002780000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:40 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef02e800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1314.963312][T10432] wireguard12: entered promiscuous mode [ 1314.968921][T10432] wireguard12: entered allmulticast mode 03:20:40 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1aa96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1315.074548][T10435] wireguard15: entered promiscuous mode [ 1315.080134][T10435] wireguard15: entered allmulticast mode 03:20:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 99) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:40 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000003780000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:40 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef02ea00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1315.211619][T10445] wireguard12: entered promiscuous mode [ 1315.217267][T10445] wireguard12: entered allmulticast mode 03:20:40 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) syz_clone(0x8e00d100, &(0x7f0000000240)="dd9ace1ea30b49bf85b19def5b4b00cde44fa0d5768ddea3242feff8f0965437be0809bf5d82cd2866f6b774a652ac538478dc194c10f857d59c941b63034c84fd78dbf0d618b0b15a5fcc05f8955e9dda8274625e83b5b9b2690b01a2be0700000070aa85184f941cac52f76dbbc5ff315c28b0075fcb159e124904c84035eacd7d5b8ad4c0061ce9d242d99789be23c49831f762fcce823a6be7222d6aeab4f8a77d902ab83e9342e390f0839bca2e5c550513", 0xb4, 0x0, 0x0, &(0x7f00000000c0)="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") shmat(0xffffffffffffffff, &(0x7f0000ff3000/0xc000)=nil, 0x4000) (async) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ff6000/0x3000)=nil) (async) r0 = shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ff3000/0x4000)=nil) shmat(r0, &(0x7f0000ff9000/0x2000)=nil, 0x0) (async) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) (async) shmat(r1, &(0x7f0000ff5000/0x2000)=nil, 0x4000) (async) mlockall(0x1) [ 1315.387698][T10447] FAULT_INJECTION: forcing a failure. [ 1315.387698][T10447] name failslab, interval 1, probability 0, space 0, times 0 [ 1315.400593][T10447] CPU: 0 PID: 10447 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1315.411064][T10447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1315.421125][T10447] Call Trace: [ 1315.424498][T10447] [ 1315.427431][T10447] dump_stack_lvl+0xda/0x130 [ 1315.432077][T10447] dump_stack+0x15/0x20 [ 1315.436261][T10447] should_fail_ex+0x21f/0x230 [ 1315.440945][T10447] ? __kernfs_new_node+0x6a/0x380 [ 1315.445981][T10447] __should_failslab+0x92/0xa0 [ 1315.450759][T10447] should_failslab+0x9/0x20 [ 1315.455277][T10447] kmem_cache_alloc+0x4e/0x250 [ 1315.460070][T10447] __kernfs_new_node+0x6a/0x380 [ 1315.464997][T10447] ? rb_insert_color+0x6a/0x290 [ 1315.469991][T10447] ? up_write+0x30/0xe0 [ 1315.474147][T10447] ? kernfs_activate+0x252/0x270 [ 1315.479201][T10447] kernfs_new_node+0x5f/0xd0 [ 1315.483803][T10447] __kernfs_create_file+0x49/0x180 [ 1315.488964][T10447] ? dev_attr_show+0x90/0x90 [ 1315.493605][T10447] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1315.499072][T10447] internal_create_group+0x2e4/0x800 [ 1315.504452][T10447] sysfs_create_groups+0x3c/0xe0 [ 1315.509461][T10447] device_add_attrs+0xf5/0x400 [ 1315.514233][T10447] ? kobject_put+0xd8/0x160 [ 1315.518797][T10447] device_add+0x431/0x8b0 [ 1315.523192][T10447] netdev_register_kobject+0xfc/0x230 [ 1315.528616][T10447] register_netdevice+0x86f/0xd60 [ 1315.533778][T10447] ? mutex_lock+0xd/0x30 [ 1315.538039][T10447] wg_newlink+0x3b2/0x580 [ 1315.542387][T10447] ? wg_setup+0x1d0/0x1d0 [ 1315.546755][T10447] rtnl_newlink+0xee5/0x1670 [ 1315.551525][T10447] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1315.557816][T10447] ? _raw_spin_unlock+0x26/0x40 [ 1315.562740][T10447] ? __mutex_lock+0x21c/0x8d0 [ 1315.567452][T10447] ? rtnl_setlink+0x300/0x300 [ 1315.572166][T10447] rtnetlink_rcv_msg+0x807/0x8c0 [ 1315.577109][T10447] ? memcg_list_lru_alloc+0xd5/0x750 [ 1315.582415][T10447] ? mod_objcg_state+0x357/0x580 [ 1315.587363][T10447] ? slab_post_alloc_hook+0x82/0x2f0 [ 1315.592666][T10447] ? kmem_cache_free+0x1d9/0x380 [ 1315.597639][T10447] ? __kfree_skb+0x104/0x140 [ 1315.602270][T10447] ? nlmon_xmit+0x4b/0x60 [ 1315.606602][T10447] ? __kfree_skb+0x104/0x140 [ 1315.611329][T10447] ? consume_skb+0x57/0x180 [ 1315.615848][T10447] ? nlmon_xmit+0x4b/0x60 [ 1315.620214][T10447] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1315.625514][T10447] ? __dev_queue_xmit+0xaae/0x1d80 [ 1315.630692][T10447] ? ref_tracker_free+0x3a1/0x400 [ 1315.635824][T10447] netlink_rcv_skb+0x126/0x220 [ 1315.640597][T10447] ? rtnetlink_bind+0x60/0x60 [ 1315.645394][T10447] rtnetlink_rcv+0x1c/0x20 [ 1315.649808][T10447] netlink_unicast+0x589/0x650 [ 1315.654592][T10447] netlink_sendmsg+0x66e/0x770 [ 1315.659364][T10447] ? netlink_getsockopt+0x3e0/0x3e0 [ 1315.664627][T10447] ____sys_sendmsg+0x37c/0x4d0 [ 1315.669447][T10447] __sys_sendmsg+0x1e9/0x270 [ 1315.674175][T10447] __x64_sys_sendmsg+0x46/0x50 [ 1315.678970][T10447] do_syscall_64+0x44/0x110 [ 1315.683498][T10447] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1315.689414][T10447] RIP: 0033:0x7efd2e8d0ce9 [ 1315.693834][T10447] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1315.713486][T10447] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1315.721903][T10447] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1315.729956][T10447] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1315.737969][T10447] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1315.745946][T10447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1315.753995][T10447] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1315.761973][T10447] [ 1315.786207][T10450] wireguard15: entered promiscuous mode [ 1315.791921][T10450] wireguard15: entered allmulticast mode 03:20:41 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x8e00d100, &(0x7f0000000240)="dd9ace1ea30b49bf85b19def5b4b00cde44fa0d5768ddea3242feff8f0965437be0809bf5d82cd2866f6b774a652ac538478dc194c10f857d59c941b63034c84fd78dbf0d618b0b15a5fcc05f8955e9dda8274625e83b5b9b2690b01a2be0700000070aa85184f941cac52f76dbbc5ff315c28b0075fcb159e124904c84035eacd7d5b8ad4c0061ce9d242d99789be23c49831f762fcce823a6be7222d6aeab4f8a77d902ab83e9342e390f0839bca2e5c550513", 0xb4, 0x0, 0x0, &(0x7f00000000c0)="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") (async) shmat(0xffffffffffffffff, &(0x7f0000ff3000/0xc000)=nil, 0x4000) (async, rerun: 64) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ff6000/0x3000)=nil) (rerun: 64) r0 = shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ff3000/0x4000)=nil) shmat(r0, &(0x7f0000ff9000/0x2000)=nil, 0x0) (async) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) (async, rerun: 32) shmat(r1, &(0x7f0000ff5000/0x2000)=nil, 0x4000) (async, rerun: 32) mlockall(0x1) 03:20:41 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000007a0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:41 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ba96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1315.962144][T10465] wireguard12: entered promiscuous mode [ 1315.967780][T10465] wireguard12: entered allmulticast mode 03:20:41 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x100000000000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:20:41 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef03ec00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:41 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) (fail_nth: 100) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:41 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000017e0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:41 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) r1 = shmget$private(0x0, 0x3000, 0x2, &(0x7f0000ffa000/0x3000)=nil) shmat(r1, &(0x7f0000281000/0x1000)=nil, 0x5000) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r2 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r0, &(0x7f00000e7000/0x4000)=nil, 0x5000) shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) shmat(r2, &(0x7f0000ffe000/0x2000)=nil, 0x4000) 03:20:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {0x37}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) getdents(r2, &(0x7f00000002c0)=""/90, 0x5a) getdents(r2, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="10000000", @ANYRES16=r4, @ANYBLOB="010000000000000000000a00cd32a7f5803b0000080001007063690011eb0c17fb3030303a30303a31302e30000000000800"], 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10004}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x160, r4, 0x100, 0x70bd28, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5, 0x83, 0x1}}]}, 0x160}, 0x1, 0x0, 0x0, 0x440c0}, 0x4) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 1316.391345][T10484] wireguard15: entered promiscuous mode [ 1316.396979][T10484] wireguard15: entered allmulticast mode [ 1316.438109][T10480] __nla_validate_parse: 16 callbacks suppressed [ 1316.438123][T10480] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1316.467465][T10480] wireguard12: entered promiscuous mode [ 1316.473047][T10480] wireguard12: entered allmulticast mode [ 1316.496294][T10487] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1316.505573][T10487] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1316.516012][T10487] FAULT_INJECTION: forcing a failure. [ 1316.516012][T10487] name failslab, interval 1, probability 0, space 0, times 0 [ 1316.528813][T10487] CPU: 1 PID: 10487 Comm: syz-executor.2 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1316.539305][T10487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1316.549404][T10487] Call Trace: [ 1316.552684][T10487] [ 1316.555615][T10487] dump_stack_lvl+0xda/0x130 [ 1316.560225][T10487] dump_stack+0x15/0x20 [ 1316.564462][T10487] should_fail_ex+0x21f/0x230 [ 1316.569224][T10487] ? __kernfs_new_node+0x6a/0x380 [ 1316.574253][T10487] __should_failslab+0x92/0xa0 [ 1316.579029][T10487] should_failslab+0x9/0x20 [ 1316.583536][T10487] kmem_cache_alloc+0x4e/0x250 [ 1316.588365][T10487] __kernfs_new_node+0x6a/0x380 [ 1316.593249][T10487] ? rb_insert_color+0x263/0x290 [ 1316.598245][T10487] ? up_write+0x30/0xe0 [ 1316.602463][T10487] ? kernfs_activate+0x252/0x270 [ 1316.607436][T10487] kernfs_new_node+0x5f/0xd0 [ 1316.612033][T10487] __kernfs_create_file+0x49/0x180 [ 1316.617695][T10487] ? dev_attr_show+0x90/0x90 [ 1316.622333][T10487] sysfs_add_file_mode_ns+0x136/0x1b0 [ 1316.627760][T10487] internal_create_group+0x2e4/0x800 [ 1316.633149][T10487] sysfs_create_groups+0x3c/0xe0 [ 1316.638125][T10487] device_add_attrs+0xf5/0x400 [ 1316.642941][T10487] ? kobject_put+0xd8/0x160 [ 1316.647520][T10487] device_add+0x431/0x8b0 [ 1316.651881][T10487] netdev_register_kobject+0xfc/0x230 [ 1316.657340][T10487] register_netdevice+0x86f/0xd60 [ 1316.662468][T10487] ? mutex_lock+0xd/0x30 [ 1316.666794][T10487] wg_newlink+0x3b2/0x580 [ 1316.671131][T10487] ? wg_setup+0x1d0/0x1d0 [ 1316.675620][T10487] rtnl_newlink+0xee5/0x1670 [ 1316.680275][T10487] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 1316.686642][T10487] ? _raw_spin_unlock+0x26/0x40 [ 1316.691555][T10487] ? __mutex_lock+0x21c/0x8d0 [ 1316.696332][T10487] ? rtnl_setlink+0x300/0x300 [ 1316.701097][T10487] rtnetlink_rcv_msg+0x807/0x8c0 [ 1316.706042][T10487] ? __rcu_read_unlock+0x4d/0x70 [ 1316.711091][T10487] ? __rcu_read_unlock+0x4d/0x70 [ 1316.716069][T10487] ? __refill_stock+0x7f/0xb0 [ 1316.720818][T10487] ? kmem_cache_free+0x1d9/0x380 [ 1316.725769][T10487] ? __kfree_skb+0x104/0x140 [ 1316.730367][T10487] ? nlmon_xmit+0x4b/0x60 [ 1316.734705][T10487] ? __kfree_skb+0x104/0x140 [ 1316.739358][T10487] ? consume_skb+0x57/0x180 [ 1316.743860][T10487] ? nlmon_xmit+0x4b/0x60 [ 1316.748200][T10487] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 1316.753512][T10487] ? __dev_queue_xmit+0xaae/0x1d80 [ 1316.758704][T10487] ? ref_tracker_free+0x3a1/0x400 [ 1316.763735][T10487] netlink_rcv_skb+0x126/0x220 [ 1316.768501][T10487] ? rtnetlink_bind+0x60/0x60 [ 1316.773192][T10487] rtnetlink_rcv+0x1c/0x20 [ 1316.777610][T10487] netlink_unicast+0x589/0x650 [ 1316.782399][T10487] netlink_sendmsg+0x66e/0x770 [ 1316.787180][T10487] ? netlink_getsockopt+0x3e0/0x3e0 [ 1316.792396][T10487] ____sys_sendmsg+0x37c/0x4d0 [ 1316.797166][T10487] __sys_sendmsg+0x1e9/0x270 [ 1316.801848][T10487] __x64_sys_sendmsg+0x46/0x50 [ 1316.806618][T10487] do_syscall_64+0x44/0x110 [ 1316.811255][T10487] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1316.817160][T10487] RIP: 0033:0x7efd2e8d0ce9 [ 1316.821627][T10487] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1316.841265][T10487] RSP: 002b:00007efd2dc320c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1316.849679][T10487] RAX: ffffffffffffffda RBX: 00007efd2e9f0050 RCX: 00007efd2e8d0ce9 [ 1316.857653][T10487] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1316.865717][T10487] RBP: 00007efd2dc32120 R08: 0000000000000000 R09: 0000000000000000 [ 1316.873777][T10487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1316.881756][T10487] R13: 000000000000006e R14: 00007efd2e9f0050 R15: 00007fffaa8de638 [ 1316.889800][T10487] 03:20:42 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef22ed00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:42 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000810000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:42 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) r1 = shmget$private(0x0, 0x3000, 0x2, &(0x7f0000ffa000/0x3000)=nil) shmat(r1, &(0x7f0000281000/0x1000)=nil, 0x5000) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) (async) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) (async) r2 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r0, &(0x7f00000e7000/0x4000)=nil, 0x5000) shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) (async) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) (async) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) shmat(r2, &(0x7f0000ffe000/0x2000)=nil, 0x4000) (async) shmat(r2, &(0x7f0000ffe000/0x2000)=nil, 0x4000) [ 1317.079649][T10501] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1317.138136][T10501] wireguard15: entered promiscuous mode [ 1317.143765][T10501] wireguard15: entered allmulticast mode 03:20:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1317.230645][T10502] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1317.269045][T10502] wireguard12: entered promiscuous mode [ 1317.274649][T10502] wireguard12: entered allmulticast mode [ 1317.336353][T10510] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1317.345909][T10510] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1317.364723][T10510] wireguard22: entered promiscuous mode [ 1317.370335][T10510] wireguard22: entered allmulticast mode 03:20:42 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef22ee00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:42 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000003810000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1317.479843][T10515] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1317.523404][T10515] wireguard15: entered promiscuous mode [ 1317.529039][T10515] wireguard15: entered allmulticast mode [ 1317.600219][T10520] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1317.667653][T10520] wireguard12: entered promiscuous mode [ 1317.673288][T10520] wireguard12: entered allmulticast mode 03:20:43 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x200000000000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:20:43 executing program 5: set_mempolicy(0x3, 0x0, 0x3) (async, rerun: 32) unshare(0x46060480) (rerun: 32) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) (async) r1 = shmget$private(0x0, 0x3000, 0x2, &(0x7f0000ffa000/0x3000)=nil) shmat(r1, &(0x7f0000281000/0x1000)=nil, 0x5000) (async, rerun: 32) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (rerun: 32) mlockall(0x2) (async) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) (async) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) (async, rerun: 32) shmctl$IPC_RMID(0x0, 0x0) (async, rerun: 32) r2 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r0, &(0x7f00000e7000/0x4000)=nil, 0x5000) (async, rerun: 64) shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) (rerun: 64) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) (async) mlockall(0x5) (async, rerun: 64) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) (async, rerun: 64) shmat(r2, &(0x7f0000ffe000/0x2000)=nil, 0x4000) 03:20:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {0x37}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) (async) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) (async) getdents(r2, &(0x7f00000002c0)=""/90, 0x5a) getdents(r2, 0x0, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="10000000", @ANYRES16=r4, @ANYBLOB="010000000000000000000a00cd32a7f5803b0000080001007063690011eb0c17fb3030303a30303a31302e30000000000800"], 0x38}}, 0x0) (async) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10004}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x160, r4, 0x100, 0x70bd28, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5, 0x83, 0x1}}]}, 0x160}, 0x1, 0x0, 0x0, 0x440c0}, 0x4) shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:20:43 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef47ee00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:43 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000002820000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1318.497601][T10527] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1318.544659][T10527] wireguard15: entered promiscuous mode [ 1318.550253][T10527] wireguard15: entered allmulticast mode [ 1318.628174][T10529] wireguard12: entered promiscuous mode [ 1318.633803][T10529] wireguard12: entered allmulticast mode [ 1318.705211][T10546] wireguard23: entered promiscuous mode [ 1318.710861][T10546] wireguard23: entered allmulticast mode 03:20:43 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef22ef00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:43 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000003830000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1318.830471][T10552] wireguard15: entered promiscuous mode [ 1318.836284][T10552] wireguard15: entered allmulticast mode [ 1319.000143][T10555] wireguard12: entered promiscuous mode [ 1319.005755][T10555] wireguard12: entered allmulticast mode 03:20:44 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00f600000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:44 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000001860000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1319.205539][T10561] wireguard15: entered promiscuous mode [ 1319.211139][T10561] wireguard15: entered allmulticast mode 03:20:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1319.280721][T10565] wireguard12: entered promiscuous mode [ 1319.286327][T10565] wireguard12: entered allmulticast mode 03:20:44 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef03f900000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1319.424278][T10570] wireguard15: entered promiscuous mode [ 1319.429867][T10570] wireguard15: entered allmulticast mode 03:20:44 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000001880000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:44 executing program 5: set_mempolicy(0x3, 0x0, 0x80000002) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) unshare(0x10000) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) shmat(r1, &(0x7f000029f000/0x4000)=nil, 0x18a9bddf5d2e1f62) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r2 = shmget$private(0x0, 0x3000, 0x10, &(0x7f000031c000/0x3000)=nil) r3 = shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) r4 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r4, 0xc) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r5, 0xc) shmctl$SHM_UNLOCK(r5, 0xc) shmat(r4, &(0x7f0000378000/0x1000)=nil, 0x0) mlockall(0x5) shmdt(r3) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1319.481890][T10572] wireguard24: entered promiscuous mode [ 1319.487500][T10572] wireguard24: entered allmulticast mode 03:20:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {0x37}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) (async) sendmsg$DEVLINK_CMD_RATE_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {0x37}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) getdents(r2, &(0x7f00000002c0)=""/90, 0x5a) (async) getdents(r2, &(0x7f00000002c0)=""/90, 0x5a) getdents(r2, 0x0, 0x0) (async) getdents(r2, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="10000000", @ANYRES16=r4, @ANYBLOB="010000000000000000000a00cd32a7f5803b0000080001007063690011eb0c17fb3030303a30303a31302e30000000000800"], 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10004}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x160, r4, 0x100, 0x70bd28, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5, 0x83, 0x1}}]}, 0x160}, 0x1, 0x0, 0x0, 0x440c0}, 0x4) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) (async) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:20:44 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x400000000000000, 0x0, 0x0, 0x0) mlockall(0x0) [ 1319.538558][T10577] wireguard12: entered promiscuous mode [ 1319.544232][T10577] wireguard12: entered allmulticast mode 03:20:44 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00fa00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:44 executing program 5: set_mempolicy(0x3, 0x0, 0x80000002) (async) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) unshare(0x10000) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) (async) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) (async) shmat(r1, &(0x7f000029f000/0x4000)=nil, 0x18a9bddf5d2e1f62) (async) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) (async) shmctl$IPC_RMID(0x0, 0x0) r2 = shmget$private(0x0, 0x3000, 0x10, &(0x7f000031c000/0x3000)=nil) r3 = shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) (async) r4 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r4, 0xc) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r5, 0xc) (async) shmctl$SHM_UNLOCK(r5, 0xc) (async) shmat(r4, &(0x7f0000378000/0x1000)=nil, 0x0) mlockall(0x5) shmdt(r3) (async) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1319.641278][T10590] wireguard15: entered promiscuous mode [ 1319.646955][T10590] wireguard15: entered allmulticast mode 03:20:44 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000047880000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:44 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef01fa00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1319.805145][T10599] wireguard12: entered promiscuous mode [ 1319.810903][T10599] wireguard12: entered allmulticast mode 03:20:45 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 1319.953285][T10605] wireguard15: entered promiscuous mode [ 1319.958946][T10605] wireguard15: entered allmulticast mode 03:20:45 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000048880000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1320.119160][T10613] wireguard12: entered promiscuous mode [ 1320.124845][T10613] wireguard12: entered allmulticast mode 03:20:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:45 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00fc00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1320.251519][T10616] wireguard15: entered promiscuous mode [ 1320.257440][T10616] wireguard15: entered allmulticast mode 03:20:45 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefffffa8880000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1320.339821][T10620] wireguard25: entered promiscuous mode [ 1320.345490][T10620] wireguard25: entered allmulticast mode 03:20:45 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef01fc00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1320.420222][T10625] wireguard12: entered promiscuous mode [ 1320.425951][T10625] wireguard12: entered allmulticast mode 03:20:45 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 1320.530206][T10630] wireguard15: entered promiscuous mode [ 1320.535881][T10630] wireguard15: entered allmulticast mode 03:20:45 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x800000000000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:20:45 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000018c0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1320.745199][T10638] wireguard12: entered promiscuous mode [ 1320.750824][T10638] wireguard12: entered allmulticast mode 03:20:46 executing program 5: set_mempolicy(0x3, 0x0, 0x80000002) unshare(0x46060480) (async) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) unshare(0x10000) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) (async) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) shmat(r1, &(0x7f000029f000/0x4000)=nil, 0x18a9bddf5d2e1f62) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) (async) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) (async) shmctl$IPC_RMID(0x0, 0x0) r2 = shmget$private(0x0, 0x3000, 0x10, &(0x7f000031c000/0x3000)=nil) shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) (async) r3 = shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) r4 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r4, 0xc) (async) shmctl$SHM_UNLOCK(r4, 0xc) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r5, 0xc) shmctl$SHM_UNLOCK(r5, 0xc) (async) shmctl$SHM_UNLOCK(r5, 0xc) shmat(r4, &(0x7f0000378000/0x1000)=nil, 0x0) mlockall(0x5) shmdt(r3) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:46 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00ff00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:46 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000029d0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x4, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:46 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000200)) shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000200)) (async) [ 1321.285034][T10647] wireguard15: entered promiscuous mode [ 1321.290713][T10647] wireguard15: entered allmulticast mode [ 1321.346942][T10650] wireguard12: entered promiscuous mode [ 1321.352541][T10650] wireguard12: entered allmulticast mode [ 1321.396175][T10655] wireguard26: entered promiscuous mode [ 1321.401761][T10655] wireguard26: entered allmulticast mode 03:20:46 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0fff00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:46 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefffffffa70000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1321.479286][T10663] __nla_validate_parse: 25 callbacks suppressed [ 1321.479361][T10663] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1321.535317][T10663] wireguard15: entered promiscuous mode [ 1321.540907][T10663] wireguard15: entered allmulticast mode [ 1321.600140][T10665] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1321.648310][T10665] wireguard12: entered promiscuous mode [ 1321.653928][T10665] wireguard12: entered allmulticast mode 03:20:46 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef7fff00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:46 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000003a80000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1321.799694][T10670] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1321.836179][T10670] wireguard15: entered promiscuous mode [ 1321.841773][T10670] wireguard15: entered allmulticast mode [ 1321.882940][T10672] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1321.902469][T10672] wireguard12: entered promiscuous mode [ 1321.908113][T10672] wireguard12: entered allmulticast mode 03:20:47 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef004003000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1322.015397][T10679] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1322.042994][T10679] wireguard15: entered promiscuous mode [ 1322.048637][T10679] wireguard15: entered allmulticast mode 03:20:47 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x900000000000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:20:47 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000002ae0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1322.120116][T10683] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1322.147856][T10683] wireguard12: entered promiscuous mode [ 1322.153470][T10683] wireguard12: entered allmulticast mode 03:20:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x5, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:47 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefffff03000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:47 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000002b20000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:47 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f0000337000/0x2000)=nil, 0x7000) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) shmctl$IPC_RMID(r1, 0x0) shmat(r0, &(0x7f0000279000/0x1000)=nil, 0x4000) shmctl$IPC_RMID(0x0, 0x0) r2 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000245000/0x3000)=nil) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1322.579390][T10689] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1322.601068][T10689] wireguard15: entered promiscuous mode [ 1322.606794][T10689] wireguard15: entered allmulticast mode [ 1322.620077][T10691] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1322.632240][T10691] wireguard12: entered promiscuous mode [ 1322.637851][T10691] wireguard12: entered allmulticast mode [ 1322.649235][T10699] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1322.658613][T10699] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1322.670514][T10699] wireguard27: entered promiscuous mode [ 1322.676090][T10699] wireguard27: entered allmulticast mode 03:20:50 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000004000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:50 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f0000337000/0x2000)=nil, 0x7000) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) shmctl$IPC_RMID(r1, 0x0) shmat(r0, &(0x7f0000279000/0x1000)=nil, 0x4000) shmctl$IPC_RMID(0x0, 0x0) r2 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000245000/0x3000)=nil) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) set_mempolicy(0x3, 0x0, 0x3) (async) unshare(0x46060480) (async) shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) (async) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async) mlockall(0x2) (async) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) (async) shmat(0x0, &(0x7f0000337000/0x2000)=nil, 0x7000) (async) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) (async) shmctl$SHM_UNLOCK(r1, 0xc) (async) shmctl$IPC_RMID(r1, 0x0) (async) shmat(r0, &(0x7f0000279000/0x1000)=nil, 0x4000) (async) shmctl$IPC_RMID(0x0, 0x0) (async) shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) (async) shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) (async) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) (async) mlockall(0x5) (async) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000245000/0x3000)=nil) (async) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) (async) 03:20:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000002b80000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x6, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:50 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x1100000000000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:20:50 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_UNLOCK(r0, 0xc) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x4010, r1, 0x4) [ 1325.147152][T10707] wireguard12: entered promiscuous mode [ 1325.152739][T10707] wireguard12: entered allmulticast mode [ 1325.188879][T10712] wireguard28: entered promiscuous mode [ 1325.194529][T10712] wireguard28: entered allmulticast mode 03:20:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000003bc0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1325.270532][T10715] wireguard12: entered promiscuous mode [ 1325.276246][T10715] wireguard12: entered allmulticast mode 03:20:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefffffffc30000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1325.397952][T10718] wireguard12: entered promiscuous mode [ 1325.403512][T10718] wireguard12: entered allmulticast mode 03:20:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000003c40000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1325.518301][T10721] wireguard12: entered promiscuous mode [ 1325.523911][T10721] wireguard12: entered allmulticast mode 03:20:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000d00000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1325.638109][T10724] wireguard12: entered promiscuous mode [ 1325.643708][T10724] wireguard12: entered allmulticast mode 03:20:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000002d40000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1325.759144][T10727] wireguard12: entered promiscuous mode [ 1325.764817][T10727] wireguard12: entered allmulticast mode 03:20:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000d80000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1325.856368][T10730] wireguard12: entered promiscuous mode [ 1325.862015][T10730] wireguard12: entered allmulticast mode 03:20:53 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00000b000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:20:53 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f0000337000/0x2000)=nil, 0x7000) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) shmctl$IPC_RMID(r1, 0x0) shmat(r0, &(0x7f0000279000/0x1000)=nil, 0x4000) shmctl$IPC_RMID(0x0, 0x0) r2 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000245000/0x3000)=nil) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) set_mempolicy(0x3, 0x0, 0x3) (async) unshare(0x46060480) (async) shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) (async) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async) mlockall(0x2) (async) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) (async) shmat(0x0, &(0x7f0000337000/0x2000)=nil, 0x7000) (async) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) (async) shmctl$SHM_UNLOCK(r1, 0xc) (async) shmctl$IPC_RMID(r1, 0x0) (async) shmat(r0, &(0x7f0000279000/0x1000)=nil, 0x4000) (async) shmctl$IPC_RMID(0x0, 0x0) (async) shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) (async) shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) (async) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) (async) mlockall(0x5) (async) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000245000/0x3000)=nil) (async) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) (async) 03:20:53 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00000ada0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:53 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x7, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1328.555985][T10738] __nla_validate_parse: 9 callbacks suppressed [ 1328.555999][T10738] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1328.647346][T10738] wireguard15: entered promiscuous mode [ 1328.652928][T10738] wireguard15: entered allmulticast mode [ 1328.707021][T10739] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1328.726426][T10739] wireguard12: entered promiscuous mode [ 1328.732093][T10739] wireguard12: entered allmulticast mode [ 1328.763017][T10745] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1328.772318][T10745] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1328.786048][T10745] wireguard29: entered promiscuous mode [ 1328.791609][T10745] wireguard29: entered allmulticast mode 03:20:57 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x1201000000000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:20:57 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefffffffe00000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:20:57 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_UNLOCK(r0, 0xc) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x4010, r1, 0x4) shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) (async) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) (async) shmctl$SHM_UNLOCK(r0, 0xc) (async) shmctl$SHM_UNLOCK(r0, 0xc) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) (async) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) (async) mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x4010, r1, 0x4) (async) 03:20:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x8, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:20:57 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) set_mempolicy(0x3, &(0x7f0000000040)=0x7fffffffffffffff, 0xa7) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82004100, &(0x7f0000000200)="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", 0x19b, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:20:57 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000010000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:21:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x9, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:21:02 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000340000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:21:02 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefffffffea0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:02 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_UNLOCK(r0, 0xc) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x4010, r1, 0x4) shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) (async) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) (async) shmctl$SHM_UNLOCK(r0, 0xc) (async) shmctl$SHM_UNLOCK(r0, 0xc) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) (async) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) (async) mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x4010, r1, 0x4) (async) [ 1337.217827][T10769] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1337.247325][T10769] wireguard15: entered promiscuous mode [ 1337.252937][T10769] wireguard15: entered allmulticast mode [ 1337.327041][T10768] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1337.347074][T10768] wireguard12: entered promiscuous mode [ 1337.352658][T10768] wireguard12: entered allmulticast mode [ 1337.402680][T10774] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1337.412048][T10774] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1337.431691][T10774] wireguard30: entered promiscuous mode [ 1337.437304][T10774] wireguard30: entered allmulticast mode 03:21:02 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000080000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:21:02 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001feffffffff00000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1337.597019][T10791] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1337.644766][T10791] wireguard15: entered promiscuous mode [ 1337.650424][T10791] wireguard15: entered allmulticast mode [ 1337.711590][T10793] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1337.732744][T10793] wireguard12: entered promiscuous mode [ 1337.738463][T10793] wireguard12: entered allmulticast mode 03:21:03 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000010000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:21:03 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x2) shmat(0xffffffffffffffff, &(0x7f0000ffe000/0x1000)=nil, 0x3000) r0 = shmget$private(0x0, 0x1000, 0x78000000, &(0x7f0000fff000/0x1000)=nil) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) shmat(r1, &(0x7f0000ffd000/0x3000)=nil, 0x2000) shmctl$SHM_UNLOCK(r0, 0xc) syz_clone(0x1204680, &(0x7f0000000040)="a3142277f3db223cd6859094d0754b18156363fbf97c3074cf06bb0ea4eb5d78bf1fe8cac4c6b65190e807083178c4df11194358cd3e4161fd65ae000000000000", 0x41, 0x0, 0x0, &(0x7f00000000c0)="fcbbfcb0c5c07c0a7bc9f14795d4595d7cc71e496eaa9ad94329517192dab1786b0027b81a0c25cdd84c510f24c4c31bf9917c534157044dee2b5ad7735355203981110cef94451e62f450b61d2bb91777e2a52e33cc2b0dcfd8c58abff4aa0d058d5ce4ad90274fbc") shmctl$SHM_UNLOCK(0x0, 0xc) 03:21:03 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000fc0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:03 executing program 5: set_mempolicy(0x3, 0x0, 0x3) (async) unshare(0x46060480) (async) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) (async) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) (async) set_mempolicy(0x3, &(0x7f0000000040)=0x7fffffffffffffff, 0xa7) (async) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) (async) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82004100, &(0x7f0000000200)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bc20ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250088e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf00000000000000e809947f22e6c28175381774bef84c1781996c23890b602a8ded1e51b55f1a20ff137317d759cb2a88afb6259ca2e1d05e282e9ed78dfd703767080d9f6b540d9c12b4a7df0695b9156a2a9593544ed405f766579d25ea8451e3fd98958638b8ff57c31f60779d295b905efee44ef069a3ac0d060f39f6208d73e725d9448e7272d6882bdc38f7f8b1e925514e9df5dccb00e9bafa2df85f80677c59f0a0a2a0702c2cb6c9f070f70f38dec232d9eb7efe", 0x19b, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:21:03 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x1502000000000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:21:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0xa, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1338.002893][T10804] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1338.036818][T10804] wireguard12: entered promiscuous mode [ 1338.042448][T10804] wireguard12: entered allmulticast mode [ 1338.069333][T10806] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1338.081613][T10806] wireguard15: entered promiscuous mode [ 1338.087213][T10806] wireguard15: entered allmulticast mode 03:21:03 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x2) shmat(0xffffffffffffffff, &(0x7f0000ffe000/0x1000)=nil, 0x3000) r0 = shmget$private(0x0, 0x1000, 0x78000000, &(0x7f0000fff000/0x1000)=nil) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) shmat(r1, &(0x7f0000ffd000/0x3000)=nil, 0x2000) (async) shmat(r1, &(0x7f0000ffd000/0x3000)=nil, 0x2000) shmctl$SHM_UNLOCK(r0, 0xc) syz_clone(0x1204680, &(0x7f0000000040)="a3142277f3db223cd6859094d0754b18156363fbf97c3074cf06bb0ea4eb5d78bf1fe8cac4c6b65190e807083178c4df11194358cd3e4161fd65ae000000000000", 0x41, 0x0, 0x0, &(0x7f00000000c0)="fcbbfcb0c5c07c0a7bc9f14795d4595d7cc71e496eaa9ad94329517192dab1786b0027b81a0c25cdd84c510f24c4c31bf9917c534157044dee2b5ad7735355203981110cef94451e62f450b61d2bb91777e2a52e33cc2b0dcfd8c58abff4aa0d058d5ce4ad90274fbc") (async) syz_clone(0x1204680, &(0x7f0000000040)="a3142277f3db223cd6859094d0754b18156363fbf97c3074cf06bb0ea4eb5d78bf1fe8cac4c6b65190e807083178c4df11194358cd3e4161fd65ae000000000000", 0x41, 0x0, 0x0, &(0x7f00000000c0)="fcbbfcb0c5c07c0a7bc9f14795d4595d7cc71e496eaa9ad94329517192dab1786b0027b81a0c25cdd84c510f24c4c31bf9917c534157044dee2b5ad7735355203981110cef94451e62f450b61d2bb91777e2a52e33cc2b0dcfd8c58abff4aa0d058d5ce4ad90274fbc") shmctl$SHM_UNLOCK(0x0, 0xc) (async) shmctl$SHM_UNLOCK(0x0, 0xc) 03:21:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0xb, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:21:09 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x2) (async) shmat(0xffffffffffffffff, &(0x7f0000ffe000/0x1000)=nil, 0x3000) (async) r0 = shmget$private(0x0, 0x1000, 0x78000000, &(0x7f0000fff000/0x1000)=nil) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) (async) shmat(r1, &(0x7f0000ffd000/0x3000)=nil, 0x2000) shmctl$SHM_UNLOCK(r0, 0xc) (async) syz_clone(0x1204680, &(0x7f0000000040)="a3142277f3db223cd6859094d0754b18156363fbf97c3074cf06bb0ea4eb5d78bf1fe8cac4c6b65190e807083178c4df11194358cd3e4161fd65ae000000000000", 0x41, 0x0, 0x0, &(0x7f00000000c0)="fcbbfcb0c5c07c0a7bc9f14795d4595d7cc71e496eaa9ad94329517192dab1786b0027b81a0c25cdd84c510f24c4c31bf9917c534157044dee2b5ad7735355203981110cef94451e62f450b61d2bb91777e2a52e33cc2b0dcfd8c58abff4aa0d058d5ce4ad90274fbc") (async) shmctl$SHM_UNLOCK(0x0, 0xc) 03:21:09 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefffff80fe0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1344.237684][T10824] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1344.246960][T10824] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1344.259400][T10824] wireguard31: entered promiscuous mode [ 1344.265004][T10824] wireguard31: entered allmulticast mode 03:21:09 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00000b010000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1344.314442][T10835] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1344.358776][T10835] wireguard12: entered promiscuous mode [ 1344.364479][T10835] wireguard12: entered allmulticast mode [ 1344.397951][T10837] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1344.425152][T10837] wireguard15: entered promiscuous mode [ 1344.430810][T10837] wireguard15: entered allmulticast mode 03:21:09 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefffffc0fe0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:09 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000020000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1344.561556][T10846] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1344.590419][T10846] wireguard12: entered promiscuous mode [ 1344.596065][T10846] wireguard12: entered allmulticast mode [ 1344.639470][T10849] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1344.665236][T10849] wireguard15: entered promiscuous mode [ 1344.670822][T10849] wireguard15: entered allmulticast mode 03:21:09 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001feffffffffe0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:10 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000030000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1344.795862][T10853] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1344.825735][T10853] wireguard12: entered promiscuous mode [ 1344.831318][T10853] wireguard12: entered allmulticast mode [ 1344.887624][T10856] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1344.899489][T10856] wireguard15: entered promiscuous mode [ 1344.905071][T10856] wireguard15: entered allmulticast mode 03:21:10 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) set_mempolicy(0x3, &(0x7f0000000040)=0x7fffffffffffffff, 0xa7) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82004100, &(0x7f0000000200)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bc20ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250088e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf00000000000000e809947f22e6c28175381774bef84c1781996c23890b602a8ded1e51b55f1a20ff137317d759cb2a88afb6259ca2e1d05e282e9ed78dfd703767080d9f6b540d9c12b4a7df0695b9156a2a9593544ed405f766579d25ea8451e3fd98958638b8ff57c31f60779d295b905efee44ef069a3ac0d060f39f6208d73e725d9448e7272d6882bdc38f7f8b1e925514e9df5dccb00e9bafa2df85f80677c59f0a0a2a0702c2cb6c9f070f70f38dec232d9eb7efe", 0x19b, &(0x7f0000000000), &(0x7f0000000080), 0x0) set_mempolicy(0x3, 0x0, 0x3) (async) unshare(0x46060480) (async) shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) (async) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async) mlockall(0x2) (async) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) (async) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) (async) set_mempolicy(0x3, &(0x7f0000000040)=0x7fffffffffffffff, 0xa7) (async) shmctl$IPC_RMID(0x0, 0x0) (async) shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) (async) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) (async) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) (async) mlockall(0x5) (async) syz_clone(0x82004100, &(0x7f0000000200)="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", 0x19b, &(0x7f0000000000), &(0x7f0000000080), 0x0) (async) 03:21:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:21:10 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/222) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:21:10 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000ff0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:10 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000040000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:21:10 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x1d00000000000000, 0x0, 0x0, 0x0) mlockall(0x0) [ 1345.318470][T10867] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1345.330520][T10867] wireguard12: entered promiscuous mode [ 1345.336121][T10867] wireguard12: entered allmulticast mode [ 1345.350363][T10866] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1345.377802][T10866] wireguard15: entered promiscuous mode [ 1345.383371][T10866] wireguard15: entered allmulticast mode [ 1345.449736][T10878] wireguard32: entered promiscuous mode [ 1345.455427][T10878] wireguard32: entered allmulticast mode 03:21:10 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00000fff0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:10 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) (async) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/222) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:21:10 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000050000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:21:11 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmctl$SHM_STAT_ANY(r0, 0xf, &(0x7f0000000200)=""/214) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) r1 = shmget$private(0x0, 0x1000, 0x200, &(0x7f00001f4000/0x1000)=nil) shmctl$SHM_STAT_ANY(r1, 0xf, &(0x7f0000000300)=""/225) shmctl$IPC_RMID(0x0, 0x0) r2 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:21:11 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0xd, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:21:14 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:21:16 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef00007fff0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1351.393454][T10893] __nla_validate_parse: 2 callbacks suppressed [ 1351.393466][T10893] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1351.491607][T10893] wireguard15: entered promiscuous mode [ 1351.497198][T10893] wireguard15: entered allmulticast mode [ 1351.523922][T10897] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1351.561788][T10897] wireguard12: entered promiscuous mode [ 1351.567395][T10897] wireguard12: entered allmulticast mode [ 1351.641224][T10901] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1351.650474][T10901] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1351.666339][T10901] wireguard33: entered promiscuous mode [ 1351.671922][T10901] wireguard33: entered allmulticast mode 03:21:16 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000ffff0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:16 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000060000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1351.780937][T10916] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1351.813750][T10916] wireguard12: entered promiscuous mode [ 1351.819462][T10916] wireguard12: entered allmulticast mode [ 1351.883575][T10919] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1351.921554][T10919] wireguard15: entered promiscuous mode [ 1351.927187][T10919] wireguard15: entered allmulticast mode 03:21:17 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0003ffff0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:17 executing program 5: set_mempolicy(0x3, 0x0, 0x3) (async, rerun: 64) unshare(0x46060480) (rerun: 64) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmctl$SHM_STAT_ANY(r0, 0xf, &(0x7f0000000200)=""/214) (async) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) (async, rerun: 32) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) (async, rerun: 32) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) (async) r1 = shmget$private(0x0, 0x1000, 0x200, &(0x7f00001f4000/0x1000)=nil) shmctl$SHM_STAT_ANY(r1, 0xf, &(0x7f0000000300)=""/225) (async, rerun: 64) shmctl$IPC_RMID(0x0, 0x0) (async, rerun: 64) r2 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) (async) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:21:17 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000001060000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1352.158733][T10923] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1352.178333][T10923] wireguard12: entered promiscuous mode [ 1352.183936][T10923] wireguard12: entered allmulticast mode [ 1352.203710][T10928] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:21:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0xe, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1352.242052][T10928] wireguard15: entered promiscuous mode [ 1352.247679][T10928] wireguard15: entered allmulticast mode [ 1352.338547][T10939] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1352.347916][T10939] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1352.361072][T10939] wireguard34: entered promiscuous mode [ 1352.366683][T10939] wireguard34: entered allmulticast mode 03:21:17 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x3900000000000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:21:17 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001feffe80ffff0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:17 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000002060000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:21:17 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) (async) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) (async) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/222) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 1352.622644][T10944] wireguard12: entered promiscuous mode [ 1352.628320][T10944] wireguard12: entered allmulticast mode [ 1352.648141][T10948] wireguard15: entered promiscuous mode [ 1352.653958][T10948] wireguard15: entered allmulticast mode 03:21:17 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef88a8ffff0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:17 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000070000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1352.811528][T10954] wireguard12: entered promiscuous mode [ 1352.817261][T10954] wireguard12: entered allmulticast mode [ 1352.844771][T10957] wireguard15: entered promiscuous mode [ 1352.850364][T10957] wireguard15: entered allmulticast mode 03:21:18 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmctl$SHM_STAT_ANY(r0, 0xf, &(0x7f0000000200)=""/214) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async) mlockall(0x2) (async) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) (async) r1 = shmget$private(0x0, 0x1000, 0x200, &(0x7f00001f4000/0x1000)=nil) shmctl$SHM_STAT_ANY(r1, 0xf, &(0x7f0000000300)=""/225) (async) shmctl$IPC_RMID(0x0, 0x0) (async) r2 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) (async) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) (async) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:21:18 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001feffec0ffff0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:18 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000080000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:21:18 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0xf, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:21:20 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) r0 = syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x3, 0x6, 0x40, 0x7, 0x0, 0xd9, 0x80, 0x17, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x34c, 0x3e12d2d0855219dd, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x8, 0x8000, 0x6, 0x401, 0x3a, 0xae, 0x0, 0x800, 0x0, 0x1000}, r0, 0x5, r1, 0x1) [ 1355.370466][T10967] wireguard12: entered promiscuous mode [ 1355.376069][T10967] wireguard12: entered allmulticast mode [ 1355.389273][T10968] wireguard15: entered promiscuous mode [ 1355.394846][T10968] wireguard15: entered allmulticast mode [ 1355.409952][T10973] wireguard35: entered promiscuous mode 03:21:20 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) r1 = shmget(0x1, 0x4000, 0x800, &(0x7f0000161000/0x4000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1355.415643][T10973] wireguard35: entered allmulticast mode 03:21:22 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xc800000000000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:21:22 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef7fffffff0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:22 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000090000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:21:22 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x10, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:21:22 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) (async) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) (async, rerun: 64) shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) (async, rerun: 64) r1 = shmget(0x1, 0x4000, 0x800, &(0x7f0000161000/0x4000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) (async) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) (async) mlockall(0x5) (async) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1357.731671][T10988] __nla_validate_parse: 8 callbacks suppressed [ 1357.731683][T10988] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1357.750361][T10988] wireguard15: entered promiscuous mode [ 1357.755950][T10988] wireguard15: entered allmulticast mode [ 1357.768338][T10986] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1357.784234][T10986] wireguard12: entered promiscuous mode [ 1357.789802][T10986] wireguard12: entered allmulticast mode [ 1357.799618][T10993] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1357.808945][T10993] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1357.821615][T10993] wireguard36: entered promiscuous mode [ 1357.827203][T10993] wireguard36: entered allmulticast mode 03:21:23 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefa7ffffff0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:23 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000000a0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1357.920835][T10998] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1357.932221][T10998] wireguard12: entered promiscuous mode [ 1357.937844][T10998] wireguard12: entered allmulticast mode [ 1357.951344][T10999] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1357.962474][T10999] wireguard15: entered promiscuous mode [ 1357.968078][T10999] wireguard15: entered allmulticast mode 03:21:23 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefc3ffffff0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:23 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000000b0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1358.045483][T11004] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1358.057588][T11004] wireguard12: entered promiscuous mode [ 1358.063409][T11004] wireguard12: entered allmulticast mode [ 1358.085997][T11007] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1358.097583][T11007] wireguard15: entered promiscuous mode [ 1358.103173][T11007] wireguard15: entered allmulticast mode 03:21:23 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefe0ffffff0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1358.193969][T11011] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1358.206127][T11011] wireguard12: entered promiscuous mode [ 1358.211750][T11011] wireguard12: entered allmulticast mode 03:21:27 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) r0 = syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x3, 0x6, 0x40, 0x7, 0x0, 0xd9, 0x80, 0x17, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x34c, 0x3e12d2d0855219dd, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x8, 0x8000, 0x6, 0x401, 0x3a, 0xae, 0x0, 0x800, 0x0, 0x1000}, r0, 0x5, r1, 0x1) shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x3, 0x6, 0x40, 0x7, 0x0, 0xd9, 0x80, 0x17, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x34c, 0x3e12d2d0855219dd, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x8, 0x8000, 0x6, 0x401, 0x3a, 0xae, 0x0, 0x800, 0x0, 0x1000}, r0, 0x5, r1, 0x1) (async) 03:21:27 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000000c0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1362.611445][T11026] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1362.623534][T11026] wireguard15: entered promiscuous mode [ 1362.629169][T11026] wireguard15: entered allmulticast mode 03:21:28 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xcd02000000000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:21:28 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fefeaffffff0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x11, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:21:28 executing program 5: set_mempolicy(0x3, 0x0, 0x3) (async) set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) (async) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) r1 = shmget(0x1, 0x4000, 0x800, &(0x7f0000161000/0x4000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) (async) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:21:28 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000000d0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1362.970200][T11037] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1363.002424][T11037] wireguard15: entered promiscuous mode [ 1363.008063][T11037] wireguard15: entered allmulticast mode [ 1363.023395][T11036] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1363.045764][T11036] wireguard12: entered promiscuous mode [ 1363.051389][T11036] wireguard12: entered allmulticast mode 03:21:28 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000000e0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1363.082023][T11045] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1363.091284][T11045] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1363.103934][T11045] wireguard37: entered promiscuous mode [ 1363.109496][T11045] wireguard37: entered allmulticast mode 03:21:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x12, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:21:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x14, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:21:31 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000000f0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:21:31 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001feff0ffffff0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1365.978843][T11054] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1365.988382][T11054] workqueue: Failed to create a rescuer kthread for wq "wg-crypt-wireguard%d": -EINTR [ 1365.988710][T11061] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1366.007544][T11061] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1366.017073][T11061] workqueue: Failed to create a rescuer kthread for wq "wg-crypt-wireguard%d": -EINTR [ 1366.555317][T11068] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1366.577216][T11068] wireguard15: entered promiscuous mode [ 1366.582779][T11068] wireguard15: entered allmulticast mode [ 1366.593370][T11070] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:21:31 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) r0 = syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x3, 0x6, 0x40, 0x7, 0x0, 0xd9, 0x80, 0x17, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x34c, 0x3e12d2d0855219dd, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x8, 0x8000, 0x6, 0x401, 0x3a, 0xae, 0x0, 0x800, 0x0, 0x1000}, r0, 0x5, r1, 0x1) [ 1366.605460][T11070] wireguard12: entered promiscuous mode [ 1366.610998][T11070] wireguard12: entered allmulticast mode [ 1366.629235][T11071] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1366.640923][T11071] wireguard38: entered promiscuous mode [ 1366.646502][T11071] wireguard38: entered allmulticast mode 03:21:31 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000100000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:21:32 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xec00000000000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:21:32 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001feffeffffff0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:32 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x8a, 0x0, 0x0) ioctl$BTRFS_IOC_ADD_DEV(r0, 0x5000940a, &(0x7f0000000200)={{}, "c8d4ef00d6b000be898bde70813db5a45ccba81ef67b085a3f009ea438f437ae36c2ff1d0098810e7d3adb7bd4636cb26a1e0d3111eb9c4401f3aa21089ba17ea7fa0d4ff400d1b5af07ccc7e907147d7ea1a4c67121d6f17e9188e5a4a5716d09e8446622450cacd3c31b9be1630b07e151412563a75e9a2b1b7a60593d8f8f20b628aaa874fe9a068bd1dae1cc655fd37dfef47abf6999e7226562560a3279163187442b28506b762bbf257235943288cff5d138e3475914e8f50de06267d11ebc81d5955d2c79c95ae99f1d3dd908179a649cadf9d6112ba17fdf4052f152301835702bfbdf3853285b8ca0f4918658fa495ef6287db4c7670cfbce688eaeea215a7031acf6736ed19a8dcf16267535697ef3bd125ad8e8dccde9728e4ec9023914fe24ad85a8b8913a044c5e66ff606d6ff76b50217e62a05c9ae12eaf367f736bb391d4d546900fdedd23286a86fd915775f4fcaf43d8495352ebabecc3ecfdc4eea87e3ea4e6ab8e0402e14aeb4778dc79d387f6796ff2f368eb1f88a9536751c829de8b2232aae1db100b9f2bd2390da419600867ba597afc98011a4976a000551881e7ec364b3d012b17f9fd0eadd9a9dd4e197be09443fc0a81695f96e9eddbbbc8562d75ddd4d462c9e46349771eb67576587a80188d6466a1de01726bfc174da55d2620c52a3b9e78d7da18da140e26c371a6ae1bdfdee9c6b668462cddc0cea268df6cf0d2d79b6318090ac6820c85544a6692c8d70788dd754dd8e2ebc2191fad97a4e79ea38a05b39d88c294aeba52a9e06a7a4225612a367c074bb291568f0421b64ca46c7cddb004a4fc022f77a3e9718aed5e9d02dbac325bed922d26f5bb38ceb7bad590a04f488f941cba69b1d87da4844fc6f83a8f80ae4796dc12549673b44a6ec7cb57d2f2c7609962b3c5228d15ddcbea77b2894625df8801a4eb15b86e87206404ad7f99ea1b667276ee73657ebe31e1a69c8403e55214fceeeafaed3ffb2f246015894bb1d80e508219638249ef3d2e12f258041a7121c72b74105f0651f36e30cb00b17e716076d6b63f454885278146d0f1ee0ba01e3f36772fe8d26e4151137ef93e383cfd15a416fb7cc862feb23a023536c58b9c1869b1cd14c07c67f44562e68de73c7f98bbef31d93923c6dff67b58e4b5be32c0a9998afc08c607e21af2b18e7651aaa9b9d343cb88c24872d40a8b9b26ff6c33dc6d175842257a2eb32950e29cd9e0503f80cda4159ca02c64de695181a3934068ee59910fde889b255f39efee1d3e012c33d2f81310e44ff67b8e516533142a37890cb39df4baef12e13887d87d557dfe532eee01c2d90c0ff1716c96ae090ff0b59359110dc234c3f188cc7cc2cbe784e56369e033641a44e8bfdcb202a0372f0e3b962c2acb4e39b11e2a3d28153b2834dbcbb8804e8b704a1577517fc679f8bea375918687529840ceff9be549fc8d50f2107d156b4bd37dde8f272517b9defb43715a9d37607c1e667eaee442128fc22c4e2c4de0ce95236359f8e453cc3e1915529e645f6557cd5671bfcacc59831b403918e7a5f1a9d05bf7bb5412794b21b3b0bc5b9ae3d6ed149662a90bf28726d4aa21192c030b297629c4879bfa70ed18728bb43f2b32177bf21316524d9311cfc40b5104e9c65bdb413ba1af959031558945b87c612ca77f324d67628ccd21fa96a0fc92bdcabe1493746baa7b73ba8cfca5bc9769ac5e390001b36973c0c93337dd60d4ba6e52723713129edd3b1a5818b44efb307216db863d4c6554fd529b5173f8144201c3f8440ac62aba263dec4a52d9e45238efe3ff92b7f13c686b242234c3682eef1d43b451afe138e6883d320cac3acb605dc88f67357599d2427d8c6197cb4953d42381f0cfab6d869f21329f1fbc109996d4e2ca595b2a837d5f5ed8c6e5a53648bb6111de0a02d0b20413a85939b86fa20e9334b969b68f479e7c12ba0ed5e60b24d921fec175a3553b9426880e7165f2b65e66442057e9a2c65195529335a78bfb31b046d6fce71d0ed88a13341edc77ea5292e54a6868d4fdde4c8e2b516cb843a631ba9b3ff9e57a3dbc1b2a46e71ba1b06c55bbe9fb415ea29846e8fb4816b0bba494f3d162195a421666fcf91aa84260555214cb110e136c28999df1ac016741ba52769ddd090538462ee72624394ad0c15f43280e542cee0d2ce5f444a95c7aae9bc6e1f2fbc53530f6f72b1f78e9c0761d97661d4af21d6570c67fb4203a7b92086da4a70ed8aab72ce604fb71ff60a9060ad4a1626bd9b2edab2c5baf0d256190d253e827f3f1e55f197ee5054857465bda9752c3c2812813a50d364d3235b84b7248b1d3b9f819491b8af34d89d2bd63115037d0a367e20657a494c94baf43ba105e71fff465b6f4b8eb03fdfcbbfb7c9f5a17275727c02f04deee376fa5a6a55e968a1c84b939e671013e804ea54f3dac2266ce8f9b57e91e366f5e446638084f2bd714b3ea56d8721b13c408c3d1f6e186e331de66941b4fc355f5e97e0104e7a5fc66975925a5faca992c34b4a91dde44bed8a0a635d8ebb2e538cdbe3c6bdab6e29b51d2aaa59591527daa5d2d170e87aa2532a29604b1657d91b0fdd315fbd2807662a66b60a0399590a677c7f75c6bf7435f4ba2cb6fe7c7f3b50a27d3c131128eadbdb29740e31c3fae9fdd52cd3abf0c4a27b44d8d099c29b99a072893c12090f5cf2d63df066bffdd9a6b2ee5458a2f5f1b90e4936f5f16ce7aa169d197f0580242879e17f13a69ab15099ee494dcd05ecc2b9c9aee34bf5e0e99057f6f0d1b3bff81f9e87480fdcaa35e105ceede2898967448bb580c635a6fa410b25077a163b524665a832826bcaaaa586039cd9d66493cea0e19a60ff5b80aa8f2c8a4f2096879c8392c3b3f487c634c6d5079fa44e3e750f76782dcd2656f445cd82939165dc15f1ed3cd87e93a13f755d6f8403dea1993a0dea802394ef121e970a00567490892fecb0dc0f1054fe7e00ce194e38b4009514d3afdd261c93e953a74fc7ca67a8af2932111c4776a6bfccf853e7cbae9978b848d78b95c3ba433bf3584427a1eab78ad8185e930b79e8eb10b12ad5a3ff4e29426a57b6fa3d8d38d5362d9174776e98fe15f777881ac3d72fa5b31b53032cb73a0488e0ca5dbf2cdbbd0c1442c451b7ff37c16a569749dd233d09d641226071fc1b33283efd1580ec19820b2e08fd2afa5953517d3b561e9201a0945bc7b0aef4d73d60065bbb7d139c2031c3df5d51216a3caf134aa020af0fb19c9987ea62863abe4ef21c2e3f76cfeb37eca595135e7d18121a31b66c2a6b8d46d46df958e3112ed224363232debab2b94c38baeb4a2b0c60b44d3a8cca27f6bfc64585653c1f73ef30a378ddd7379ed08313ad3ea796eb27b7ea883531315a2b17e663cd8cceed000e34422de6ad711265f7f29de0237d6e7734a2bdee46827d87ed011f63e3183bc45b3710f286eb919bae02e7824cd1d4366ff43cad0b3ae7ce3b75db08296699f4b42dd4f00a719e44d7116e8b24ee76b5f7216b1d906f87591ba4eb7a9ad161dcdfd35be62289fcac7f22d721f9f4d9eb2d516e33d21b3b09674ff32c67410d781a44d5141235d91e4d36c4459f888df9e494f94a2978f2fb8d8e30ad174b164f7b41a10262bfb9bc381f227252e4f43ff7db0c11f059428c686b15d9941412531556bde63096ef8d3a163beb4eebd977aa39cf1ca51f4677ed1a455c39769d0b3369c4dbeace8e5c49e8491920a73a23f778706d7b75dd55828a256c64bd421c0da80ac8d297264109d39095fb628e4f8381b1a1fa7c22aba005dd1e13c85c8095dbbcce34cb2306a7c9c1fb73037d3a425c052a30bf9f9220b2d6875f62ee781fb3ab8c74c592806d54b7ec2470ed30a4711638e7d61037bd9f6a4606caa231092324c361b8017210a67d03d92decebc5caf41d11082dfbfaa8653189a0ef077866269451738fb277f03e0913eec9183bf1747ad73d88ec3b0460c8de7052ebb90160b6563dbbb74d357d786e81a1bd895864de0c38f0dc2cba0b4da58b13e14588c715a3fb775b8983557f3ce5914db923f8bf96d4f2a73de91b0318aee22533274d5b3cd6d325c54e4baf88e899e7ab6418d48d87580636bc7e83c76f99564226ef4048b36272eaa5e8927486c773c279d26656196b944a62b6a1c4cd86c471c6506c54a3c85b569b4ff82a747ca9bb12a5d4b4f481689c0d05e16f523410a310333cb91142b34f6f6a6d72872ac8f044f4dce6afdd88e42ae176d9348f1182c267b3b9fa4c083a5b7f9db37541e6d3b7117b55ef3ffe73200a602c04f23812d6cd7af8b293cbfed22ab2135de75f0ba50321df4931bb285308677fbdd38d3610f18eec75726ffda98f95a755364a1d142f0115dd96d76c38a00859c06e8180e54e8757f8e5700ef3ec05328f664142a3bc9920df04ee9b7cbfbcc03a5dbb928e481ae56fe33fde022eaa9ba6a8d6ba2c6166d43fd260a405eb52faaf2805294c667b9447339025593ec168bbaf91314e48df999b3fcade007f7cb696e9ecda705012fd35a6a5aa764df58d9e4530fe40d3058b9b2bb565abe7897eb78fb0138ffe90933350db40e5262688a9763b99138daeb29666c53d64cbdf2ab4932870fb1dd7741ce0e75c84c0dcd9677412a34464623fdc95ec1e177983561ff5d7c28075563678f5e7c8452b8d63993f349428010e2a9854b48ed5698a1501d5f712b73187f761d99f1fd04f3ce85cee780e4c59e954fcbd3fff67ef965059863f7d31e780c9275fb77dd93c893636ac245c84f25f8f75e4d018643565b61196dea769481e1ca0818ceed975c39b895299bd06f92f487e5c2e344ecb0d2aee8251d82ae2b7a49ff71fa6218e59e4ac5cb16d8e2a72a49523504a3096e45c8cace519f853ecdb10f6b95e338fbc5257e49310c33ff6e7ffdce48eb58966a47fc378583b9c1fec6ec0f0f3a15b7062089f3b142c548c17fb398797bf68ed96120fc8627853c6522509516b16074055e2386592435173e0efa12b5a032685aa602bf5d8f3b0b915f827fc775e1f9407c2b9a0fa68652a5ac7d181f4ce268aef97b9d254c764ca1f7d4b9423f942dc114fcac64c17942827d4eacdb9f1571861676e713a660003d39104e79b6ef5a30b924069f68ead3d7ff915c2d78849688e387ecefb19ffeb022341e3b2432648c39d60a283ba9b17574e6bb9dff730e5716f1688baae95d594cade59c7c3e4725261289f75f72bf8954b6753585639d81a432ded96ac15727b8a0522542635d963c2cdef98d69184cbe00f92260de04fe6b003771158de2556cb2fbae6bd60150d5d468da4c9a2704fbecf64f6ef04561f9a1db8878a97e8c35b8b6ee0c680d1a935a33106ab57fd6191efe751ea92cdd74fcf12e5f2565ea987855b9197f8b423ff911a36bc093c5431ad9d986ee78e4b8782cd20e8f8f85daba322771ae4af3465d342f5d276275086327908efc86d90a4784bb169ef083508cc37428ade208fd57a01b59ed83fd0798d22ff04f24bc2f17a02fa6be4e3a665e0de180315ad01bd6d12f70c182a8356e7d0b91bdd4b5a99848369c532828930ed7b9a1f2419326fd714d50487ead2420addb1b75a34dbd8a0a5d16d87f52fe4f2e53c84df701ec6777a62890b94f8605a2d96899bebeb0aa16558d0e4ae255d6cfe6b9bd18bd94959b08e0a782693b2e96409b1ba8af38faf2ea88781470036de75868548e8f26c4b8b36a20d3c7de6abd"}) set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r1 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r1, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmget$private(0x0, 0x2000, 0x800, &(0x7f0000026000/0x2000)=nil) shmget(0x0, 0x2000, 0x400, &(0x7f000008a000/0x2000)=nil) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f00002a5000/0x3000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) shmat(r2, &(0x7f0000ffd000/0x1000)=nil, 0x2000) r3 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) shmget(0x3, 0x4000, 0x8, &(0x7f0000272000/0x4000)=nil) r4 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r4, 0xc) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r5, 0xc) r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000324000/0x1000)=nil) shmctl$SHM_UNLOCK(r6, 0xc) shmctl$IPC_RMID(r6, 0x0) r7 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r7, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1368.533469][T11079] __nla_validate_parse: 1 callbacks suppressed [ 1368.533489][T11079] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:21:33 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x16, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1368.597922][T11079] wireguard12: entered promiscuous mode [ 1368.603523][T11079] wireguard12: entered allmulticast mode [ 1368.638385][T11080] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1368.660271][T11080] wireguard15: entered promiscuous mode [ 1368.665949][T11080] wireguard15: entered allmulticast mode 03:21:33 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) (async) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x8a, 0x0, 0x0) ioctl$BTRFS_IOC_ADD_DEV(r0, 0x5000940a, &(0x7f0000000200)={{}, "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"}) (async) set_mempolicy(0x3, 0x0, 0x3) (async, rerun: 64) unshare(0x46060480) (async, rerun: 64) r1 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r1, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async, rerun: 64) mlockall(0x2) (async, rerun: 64) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) (async, rerun: 64) shmget$private(0x0, 0x2000, 0x800, &(0x7f0000026000/0x2000)=nil) (async, rerun: 64) shmget(0x0, 0x2000, 0x400, &(0x7f000008a000/0x2000)=nil) (async) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f00002a5000/0x3000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) (async, rerun: 32) shmat(r2, &(0x7f0000ffd000/0x1000)=nil, 0x2000) (async, rerun: 32) r3 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) (async, rerun: 64) shmget(0x3, 0x4000, 0x8, &(0x7f0000272000/0x4000)=nil) (async, rerun: 64) r4 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r4, 0xc) (async) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r5, 0xc) (async) r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000324000/0x1000)=nil) shmctl$SHM_UNLOCK(r6, 0xc) shmctl$IPC_RMID(r6, 0x0) (async) r7 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r7, &(0x7f0000256000/0x1000)=nil, 0x4000) (async) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) (async) mlockall(0x5) (async) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:21:33 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:33 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000110000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1368.808249][T11098] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1368.840719][T11098] wireguard12: entered promiscuous mode [ 1368.846362][T11098] wireguard12: entered allmulticast mode [ 1368.865311][T11101] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1368.876867][T11101] wireguard15: entered promiscuous mode [ 1368.882424][T11101] wireguard15: entered allmulticast mode 03:21:34 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000300000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1371.677212][T11105] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1371.689177][T11105] wireguard12: entered promiscuous mode [ 1371.694774][T11105] wireguard12: entered allmulticast mode 03:21:36 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000120000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1371.775238][T11108] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1371.787147][T11108] wireguard15: entered promiscuous mode [ 1371.792744][T11108] wireguard15: entered allmulticast mode 03:21:36 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1371.856006][T11112] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1371.869113][T11112] wireguard12: entered promiscuous mode [ 1371.874690][T11112] wireguard12: entered allmulticast mode [ 1374.087228][T11121] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1374.096476][T11121] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1374.125357][T11121] wireguard39: entered promiscuous mode [ 1374.130927][T11121] wireguard39: entered allmulticast mode 03:21:42 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000500000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:42 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x8a, 0x0, 0x0) (async) ioctl$BTRFS_IOC_ADD_DEV(r0, 0x5000940a, &(0x7f0000000200)={{}, "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"}) set_mempolicy(0x3, 0x0, 0x3) (async) unshare(0x46060480) (async, rerun: 64) r1 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) (rerun: 64) shmat(r1, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async, rerun: 64) mlockall(0x2) (async, rerun: 64) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmget$private(0x0, 0x2000, 0x800, &(0x7f0000026000/0x2000)=nil) shmget(0x0, 0x2000, 0x400, &(0x7f000008a000/0x2000)=nil) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f00002a5000/0x3000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) (async) shmat(r2, &(0x7f0000ffd000/0x1000)=nil, 0x2000) r3 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) (async) shmget(0x3, 0x4000, 0x8, &(0x7f0000272000/0x4000)=nil) (async) r4 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r4, 0xc) (async) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r5, 0xc) (async) r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000324000/0x1000)=nil) shmctl$SHM_UNLOCK(r6, 0xc) (async) shmctl$IPC_RMID(r6, 0x0) (async) r7 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r7, &(0x7f0000256000/0x1000)=nil, 0x4000) (async, rerun: 32) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) (rerun: 32) mlockall(0x5) (async) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:21:42 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000002150000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:21:42 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000000)="0a0123c97115800358c75f6864d2a0de265d7ee8a1e7743ea54343674ecb64612055a8fa1e6d000000000000001bfca2950496fbd4fa84b722e0d35a17a679028a3f73b44ad11f49addcec58a8bf7bdf7308171000fa8a8995156d345dc67d0bcfbe7670ee9fa5a4a7cc5f989156ae06561b671bc2704f9ae42b1354cf4ea52571a80740c32686e80473", 0x8a, 0x0, 0x0, &(0x7f00000000c0)="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") 03:21:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x1d, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:21:42 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xef02000000000000, 0x0, 0x0, 0x0) mlockall(0x0) [ 1377.793862][T11135] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1377.835038][T11135] wireguard12: entered promiscuous mode [ 1377.840719][T11135] wireguard12: entered allmulticast mode [ 1377.884325][T11136] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1377.920939][T11136] wireguard15: entered promiscuous mode [ 1377.926555][T11136] wireguard15: entered allmulticast mode 03:21:43 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) unshare(0x1200) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) r2 = shmget$private(0x0, 0x3000, 0x54000000, &(0x7f000019d000/0x3000)=nil) shmat(r2, &(0x7f0000355000/0x1000)=nil, 0xa000) mlockall(0x5) r3 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000ff9000/0x4000)=nil) shmat(r3, &(0x7f0000001000/0x3000)=nil, 0x1000) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:21:43 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000600000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1377.963836][T11143] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1377.973115][T11143] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1377.987491][T11143] wireguard40: entered promiscuous mode [ 1377.993055][T11143] wireguard40: entered allmulticast mode 03:21:43 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000001a0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:21:43 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) (async) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) unshare(0x1200) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async) mlockall(0x2) (async) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) (async) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) (async) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) r2 = shmget$private(0x0, 0x3000, 0x54000000, &(0x7f000019d000/0x3000)=nil) shmat(r2, &(0x7f0000355000/0x1000)=nil, 0xa000) (async) mlockall(0x5) (async) r3 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000ff9000/0x4000)=nil) shmat(r3, &(0x7f0000001000/0x3000)=nil, 0x1000) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1378.057333][T11154] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1378.069511][T11154] wireguard12: entered promiscuous mode [ 1378.075149][T11154] wireguard12: entered allmulticast mode 03:21:43 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) unshare(0x1200) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) r2 = shmget$private(0x0, 0x3000, 0x54000000, &(0x7f000019d000/0x3000)=nil) shmat(r2, &(0x7f0000355000/0x1000)=nil, 0xa000) mlockall(0x5) r3 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000ff9000/0x4000)=nil) shmat(r3, &(0x7f0000001000/0x3000)=nil, 0x1000) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) set_mempolicy(0x3, 0x0, 0x3) (async) unshare(0x46060480) (async) shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) (async) unshare(0x1200) (async) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async) mlockall(0x2) (async) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) (async) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) (async) shmctl$IPC_RMID(0x0, 0x0) (async) shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) (async) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) (async) shmget$private(0x0, 0x3000, 0x54000000, &(0x7f000019d000/0x3000)=nil) (async) shmat(r2, &(0x7f0000355000/0x1000)=nil, 0xa000) (async) mlockall(0x5) (async) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000ff9000/0x4000)=nil) (async) shmat(r3, &(0x7f0000001000/0x3000)=nil, 0x1000) (async) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) (async) 03:21:43 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000700000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1378.179904][T11164] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1378.198468][T11164] wireguard12: entered promiscuous mode [ 1378.204114][T11164] wireguard12: entered allmulticast mode 03:21:43 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1378.360759][T11174] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1378.383663][T11174] wireguard12: entered promiscuous mode [ 1378.389346][T11174] wireguard12: entered allmulticast mode [ 1383.289676][T11178] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:21:48 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000000)="0a0123c97115800358c75f6864d2a0de265d7ee8a1e7743ea54343674ecb64612055a8fa1e6d000000000000001bfca2950496fbd4fa84b722e0d35a17a679028a3f73b44ad11f49addcec58a8bf7bdf7308171000fa8a8995156d345dc67d0bcfbe7670ee9fa5a4a7cc5f989156ae06561b671bc2704f9ae42b1354cf4ea52571a80740c32686e80473", 0x8a, 0x0, 0x0, &(0x7f00000000c0)="f4eda4700e173af08fbb79ec2ba23abb97c40c791bcb9aa9666701f08ec6ef11c85dbb0efc2aba41cf39fa48d8dc7218655fb56821a2782500000000000000007878adc47fe4d30dafcb814ccbd7e0cb88d48cfaf0d2545b29487b1e6fb0d29655953553a6d3c08b33906a18dbef6a6b28d338138b41a23f3cb12bdb305a34b79889faba4f0ed565ebab90cf0d554f685ac09df06164a1f047d3bd80c1909ddf72f385b504a4aed6fcc80e8c117b9665cfeb024176b31e336e12697f0d017fa4b04880ea417d7a94040183acf1f15661747972bdf2e91c3c839b0264bf1b7e8c0c1d08976400aa40bc72aa0e37c4a1e9c60626d4cbdf8bcdf1228fe35bc54f2b133846ea46190e2d108a9f32e00bddbdbea6ca57e5eb64ae0539b101f25b79cad2f06d4db69a1570d2e0db6cb7bac6968fc644c3c09a5a06") shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000000)="0a0123c97115800358c75f6864d2a0de265d7ee8a1e7743ea54343674ecb64612055a8fa1e6d000000000000001bfca2950496fbd4fa84b722e0d35a17a679028a3f73b44ad11f49addcec58a8bf7bdf7308171000fa8a8995156d345dc67d0bcfbe7670ee9fa5a4a7cc5f989156ae06561b671bc2704f9ae42b1354cf4ea52571a80740c32686e80473", 0x8a, 0x0, 0x0, &(0x7f00000000c0)="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") (async) 03:21:48 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000900000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:48 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x24, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:21:48 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0) mlockall(0x0) [ 1383.372675][T11178] wireguard15: entered promiscuous mode [ 1383.378323][T11178] wireguard15: entered allmulticast mode [ 1383.446461][T11183] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1383.467680][T11183] wireguard12: entered promiscuous mode [ 1383.473260][T11183] wireguard12: entered allmulticast mode [ 1383.490143][T11190] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1383.499397][T11190] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1383.516291][T11190] wireguard41: entered promiscuous mode [ 1383.521930][T11190] wireguard41: entered allmulticast mode 03:21:48 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000011a0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:21:48 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000a00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1383.595349][T11199] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1383.646534][T11199] wireguard15: entered promiscuous mode [ 1383.652109][T11199] wireguard15: entered allmulticast mode [ 1383.698106][T11202] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1383.750433][T11202] wireguard12: entered promiscuous mode [ 1383.756035][T11202] wireguard12: entered allmulticast mode 03:21:49 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xfbffffff00000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:21:49 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000001d0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:21:49 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000b00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1383.922643][T11209] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1383.956460][T11209] wireguard15: entered promiscuous mode [ 1383.962046][T11209] wireguard15: entered allmulticast mode [ 1383.992393][T11213] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1384.016110][T11213] wireguard12: entered promiscuous mode [ 1384.021689][T11213] wireguard12: entered allmulticast mode 03:21:49 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000200000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:21:49 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000c00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:49 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0xa0000, &(0x7f0000000200)="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", 0x169, &(0x7f0000000040), &(0x7f0000000080), 0x0) r2 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) shmat(r2, &(0x7f0000391000/0x3000)=nil, 0x0) [ 1384.152052][T11218] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1384.168257][T11218] wireguard15: entered promiscuous mode [ 1384.173943][T11218] wireguard15: entered allmulticast mode [ 1384.193112][T11220] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1384.208715][T11220] wireguard12: entered promiscuous mode [ 1384.214326][T11220] wireguard12: entered allmulticast mode 03:21:49 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) syz_clone(0x0, &(0x7f0000000000)="0a0123c97115800358c75f6864d2a0de265d7ee8a1e7743ea54343674ecb64612055a8fa1e6d000000000000001bfca2950496fbd4fa84b722e0d35a17a679028a3f73b44ad11f49addcec58a8bf7bdf7308171000fa8a8995156d345dc67d0bcfbe7670ee9fa5a4a7cc5f989156ae06561b671bc2704f9ae42b1354cf4ea52571a80740c32686e80473", 0x8a, 0x0, 0x0, &(0x7f00000000c0)="f4eda4700e173af08fbb79ec2ba23abb97c40c791bcb9aa9666701f08ec6ef11c85dbb0efc2aba41cf39fa48d8dc7218655fb56821a2782500000000000000007878adc47fe4d30dafcb814ccbd7e0cb88d48cfaf0d2545b29487b1e6fb0d29655953553a6d3c08b33906a18dbef6a6b28d338138b41a23f3cb12bdb305a34b79889faba4f0ed565ebab90cf0d554f685ac09df06164a1f047d3bd80c1909ddf72f385b504a4aed6fcc80e8c117b9665cfeb024176b31e336e12697f0d017fa4b04880ea417d7a94040183acf1f15661747972bdf2e91c3c839b0264bf1b7e8c0c1d08976400aa40bc72aa0e37c4a1e9c60626d4cbdf8bcdf1228fe35bc54f2b133846ea46190e2d108a9f32e00bddbdbea6ca57e5eb64ae0539b101f25b79cad2f06d4db69a1570d2e0db6cb7bac6968fc644c3c09a5a06") 03:21:49 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x25, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:21:49 executing program 5: set_mempolicy(0x3, 0x0, 0x3) (async) unshare(0x46060480) (async, rerun: 32) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) (rerun: 32) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async, rerun: 64) mlockall(0x2) (rerun: 64) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) (async) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) (async) shmctl$IPC_RMID(0x0, 0x0) (async, rerun: 64) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) (rerun: 64) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) (async, rerun: 64) syz_clone(0xa0000, &(0x7f0000000200)="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", 0x169, &(0x7f0000000040), &(0x7f0000000080), 0x0) (rerun: 64) r2 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) (async) shmat(r2, &(0x7f0000391000/0x3000)=nil, 0x0) 03:21:49 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000002220000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:21:49 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000d00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1384.619006][T11233] wireguard15: entered promiscuous mode [ 1384.624606][T11233] wireguard15: entered allmulticast mode 03:21:49 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) (async) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async) mlockall(0x2) (async) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) (async) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) (async) syz_clone(0xa0000, &(0x7f0000000200)="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", 0x169, &(0x7f0000000040), &(0x7f0000000080), 0x0) r2 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) shmat(r2, &(0x7f0000391000/0x3000)=nil, 0x0) [ 1384.661099][T11239] wireguard12: entered promiscuous mode [ 1384.666725][T11239] wireguard12: entered allmulticast mode [ 1384.691562][T11247] wireguard42: entered promiscuous mode [ 1384.697195][T11247] wireguard42: entered allmulticast mode 03:21:52 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xfc00000000000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:21:52 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000e00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:52 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000240000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:21:52 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) mlockall(0x6) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(r0, &(0x7f000018b000/0x1000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) r2 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) shmat(r2, &(0x7f0000ffe000/0x1000)=nil, 0x4000) set_mempolicy(0x8000, &(0x7f0000000040)=0x1, 0x5) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) r3 = shmget$private(0x0, 0x1000, 0x1404, &(0x7f00001c4000/0x1000)=nil) shmctl$SHM_LOCK(r3, 0xb) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:21:52 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x2f, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:21:52 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x8002200, &(0x7f0000000000)="6371e45fd7eb780497cb0a0746fd682dab3f460c01dd2e048c86157f60521263e927a7467b46f6614eacf3237950f332cf173039012131ceaa443172aa935b2c24396c53689bec900a4d2b8ae26b07eb82bf55f1f4aa9b8782735e8670a6baa3634cc798848443", 0x67, 0x0, 0x0, &(0x7f00000002c0)="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") [ 1389.682141][T11262] __nla_validate_parse: 4 callbacks suppressed [ 1389.682153][T11262] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1389.724829][T11262] wireguard15: entered promiscuous mode [ 1389.730528][T11262] wireguard15: entered allmulticast mode [ 1389.753032][T11260] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1389.785606][T11260] wireguard12: entered promiscuous mode [ 1389.791412][T11260] wireguard12: entered allmulticast mode [ 1389.836704][T11269] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1389.846015][T11269] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1389.858753][T11269] wireguard43: entered promiscuous mode [ 1389.864348][T11269] wireguard43: entered allmulticast mode 03:21:55 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000f00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:21:55 executing program 5: set_mempolicy(0x3, 0x0, 0x3) (async) unshare(0x46060480) (async) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) mlockall(0x6) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) (async) shmat(r0, &(0x7f000018b000/0x1000)=nil, 0x9000) (async) shmctl$IPC_RMID(0x0, 0x0) (async) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) r2 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) (async) shmat(r2, &(0x7f0000ffe000/0x1000)=nil, 0x4000) (async) set_mempolicy(0x8000, &(0x7f0000000040)=0x1, 0x5) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) (async) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) r3 = shmget$private(0x0, 0x1000, 0x1404, &(0x7f00001c4000/0x1000)=nil) shmctl$SHM_LOCK(r3, 0xb) (async) mlockall(0x5) (async) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:21:55 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000250000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:21:55 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x32, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:21:56 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) (async, rerun: 32) syz_clone(0x8002200, &(0x7f0000000000)="6371e45fd7eb780497cb0a0746fd682dab3f460c01dd2e048c86157f60521263e927a7467b46f6614eacf3237950f332cf173039012131ceaa443172aa935b2c24396c53689bec900a4d2b8ae26b07eb82bf55f1f4aa9b8782735e8670a6baa3634cc798848443", 0x67, 0x0, 0x0, &(0x7f00000002c0)="3f06891307000000a74878a1532967567cae429359920bb6c6ab6f0f42797a32b0b7e379095caf833c1d001e9dbd1bb10885cc25e6518aca034f75ee159e1d6c341c3c0a7647f195232d7af9d73a6356d9236f6fbeac4eab211f1e7862c34f38325b28328949864a30a17ec1763d3cf5b57a0fcbd467b15a87936f8f2ff48e785199b23826c1152893939a795c3fd5c9f14b8f841da6c2319113c4dc94a778dd740a69fdedd659c319683a8c4e3162446edcb4fa97b4c9fd9076bf7ed4fee508adf965a6f67dc4e2cb29b17b4e127bed55ebdba54175e62e529e9375fbc50a5b1ff9155a032ca900000000000000206e2327441d9906c00198cab9cebd58ed3ac8c8e37394e64599aa515ee51a5c5a8979c0638dbb43c43893b5ce5e459696c895d582399b4fe93ede9726e3000000000000000000") (rerun: 32) 03:21:57 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xff8fe371d07f0000, 0x0, 0x0, 0x0) mlockall(0x0) 03:21:58 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x8002200, &(0x7f0000000000)="6371e45fd7eb780497cb0a0746fd682dab3f460c01dd2e048c86157f60521263e927a7467b46f6614eacf3237950f332cf173039012131ceaa443172aa935b2c24396c53689bec900a4d2b8ae26b07eb82bf55f1f4aa9b8782735e8670a6baa3634cc798848443", 0x67, 0x0, 0x0, &(0x7f00000002c0)="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") [ 1395.145729][T11291] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1395.162798][T11291] wireguard12: entered promiscuous mode [ 1395.168458][T11291] wireguard12: entered allmulticast mode [ 1395.181809][T11297] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1395.215101][T11297] wireguard15: entered promiscuous mode [ 1395.220707][T11297] wireguard15: entered allmulticast mode [ 1395.234611][T11304] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1395.244001][T11304] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1395.256599][T11304] wireguard44: entered promiscuous mode [ 1395.262163][T11304] wireguard44: entered allmulticast mode 03:22:00 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef001000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:22:00 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xffefff1f00000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:22:00 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000003280000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1395.363859][T11310] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1395.387628][T11310] wireguard12: entered promiscuous mode [ 1395.393232][T11310] wireguard12: entered allmulticast mode [ 1395.416131][T11313] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1395.428829][T11313] wireguard15: entered promiscuous mode [ 1395.434504][T11313] wireguard15: entered allmulticast mode 03:22:00 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef001100000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:22:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x39, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:22:01 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef001200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1396.696997][T11319] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1396.706599][T11319] workqueue: Failed to create a rescuer kthread for wq "wg-crypt-wireguard%d": -EINTR [ 1396.706729][T11322] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1396.726416][T11322] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1396.738823][T11322] wireguard45: entered promiscuous mode [ 1396.744433][T11322] wireguard45: entered allmulticast mode [ 1396.756516][T11326] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1396.768410][T11326] wireguard12: entered promiscuous mode [ 1396.774042][T11326] wireguard12: entered allmulticast mode 03:22:02 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000022e0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:22:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x3a, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:22:02 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef001d00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:22:02 executing program 4: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getdents(r0, &(0x7f00000002c0)=""/90, 0x5a) getdents(r0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x88, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}]}, 0x88}, 0x1, 0x0, 0x0, 0x24040885}, 0x880) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:22:02 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async) mlockall(0x2) mlockall(0x6) (async) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) (async) shmat(r0, &(0x7f000018b000/0x1000)=nil, 0x9000) (async) shmctl$IPC_RMID(0x0, 0x0) (async) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) r2 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) (async) shmat(r2, &(0x7f0000ffe000/0x1000)=nil, 0x4000) set_mempolicy(0x8000, &(0x7f0000000040)=0x1, 0x5) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) (async) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) r3 = shmget$private(0x0, 0x1000, 0x1404, &(0x7f00001c4000/0x1000)=nil) shmctl$SHM_LOCK(r3, 0xb) (async) mlockall(0x5) (async) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1397.522706][T11334] wireguard15: entered promiscuous mode [ 1397.528388][T11334] wireguard15: entered allmulticast mode [ 1397.540739][T11333] wireguard12: entered promiscuous mode [ 1397.546348][T11333] wireguard12: entered allmulticast mode 03:22:02 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) r2 = shmget(0x2, 0x1000, 0x40, &(0x7f0000ffe000/0x1000)=nil) shmat(r2, &(0x7f000036c000/0x4000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:22:02 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) (async) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async) mlockall(0x2) (async) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) (async) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) (async) shmctl$IPC_RMID(0x0, 0x0) (async) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) (async) r2 = shmget(0x2, 0x1000, 0x40, &(0x7f0000ffe000/0x1000)=nil) shmat(r2, &(0x7f000036c000/0x4000)=nil, 0x4000) (async) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) (async) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1397.579402][T11340] wireguard46: entered promiscuous mode [ 1397.585007][T11340] wireguard46: entered allmulticast mode 03:22:03 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0x82040000, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) mlockall(0x0) 03:22:03 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef002400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:22:03 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000002f0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:22:03 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) r2 = shmget(0x2, 0x1000, 0x40, &(0x7f0000ffe000/0x1000)=nil) shmat(r2, &(0x7f000036c000/0x4000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) set_mempolicy(0x3, 0x0, 0x3) (async) unshare(0x46060480) (async) shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) (async) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async) mlockall(0x2) (async) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) (async) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) (async) shmctl$IPC_RMID(0x0, 0x0) (async) shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) (async) shmat(r1, &(0x7f0000256000/0x1000)=nil, 0x4000) (async) shmget(0x2, 0x1000, 0x40, &(0x7f0000ffe000/0x1000)=nil) (async) shmat(r2, &(0x7f000036c000/0x4000)=nil, 0x4000) (async) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) (async) mlockall(0x5) (async) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) (async) 03:22:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x48, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:22:06 executing program 4: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) (async) getdents(r0, &(0x7f00000002c0)=""/90, 0x5a) getdents(r0, 0x0, 0x0) (async) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x88, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}]}, 0x88}, 0x1, 0x0, 0x0, 0x24040885}, 0x880) (async) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:22:10 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000003300000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:22:10 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef002500000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1405.726734][T11366] __nla_validate_parse: 4 callbacks suppressed [ 1405.726780][T11366] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:22:11 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x20, &(0x7f00000cf000/0x3000)=nil) shmat(r1, &(0x7f0000ffd000/0x2000)=nil, 0x1000) r2 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) unshare(0xa040300) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1405.831524][T11366] wireguard12: entered promiscuous mode [ 1405.837152][T11366] wireguard12: entered allmulticast mode [ 1405.881489][T11367] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1405.940538][T11367] wireguard15: entered promiscuous mode [ 1405.946248][T11367] wireguard15: entered allmulticast mode [ 1406.018168][T11370] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1406.027448][T11370] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1406.040679][T11370] wireguard47: entered promiscuous mode [ 1406.046353][T11370] wireguard47: entered allmulticast mode 03:22:11 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef002d00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:22:11 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000320000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1406.164021][T11387] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1406.199401][T11387] wireguard12: entered promiscuous mode [ 1406.205072][T11387] wireguard12: entered allmulticast mode [ 1406.242163][T11390] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1406.269905][T11390] wireguard15: entered promiscuous mode [ 1406.275606][T11390] wireguard15: entered allmulticast mode 03:22:11 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x4c, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1408.148037][T11395] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1408.157287][T11395] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 03:22:14 executing program 3: unshare(0x46060480) mlockall(0x1) unshare(0x40000800) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x0) 03:22:14 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x56, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:22:14 executing program 4: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) (async) getdents(r0, &(0x7f00000002c0)=""/90, 0x5a) (async) getdents(r0, 0x0, 0x0) (async) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x88, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}]}, 0x88}, 0x1, 0x0, 0x0, 0x24040885}, 0x880) (async) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:22:14 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000001360000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:22:14 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef002f00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:22:14 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x20, &(0x7f00000cf000/0x3000)=nil) shmat(r1, &(0x7f0000ffd000/0x2000)=nil, 0x1000) r2 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) unshare(0xa040300) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) set_mempolicy(0x3, 0x0, 0x3) (async) unshare(0x46060480) (async) shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) (async) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async) mlockall(0x2) (async) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) (async) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) (async) shmctl$IPC_RMID(0x0, 0x0) (async) shmget$private(0x0, 0x3000, 0x20, &(0x7f00000cf000/0x3000)=nil) (async) shmat(r1, &(0x7f0000ffd000/0x2000)=nil, 0x1000) (async) shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) (async) shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) (async) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) (async) unshare(0xa040300) (async) mlockall(0x5) (async) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) (async) [ 1408.166687][T11395] workqueue: Failed to create a rescuer kthread for wq "wg-crypt-wireguard%d": -EINTR [ 1409.753652][T11403] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1409.804201][T11403] wireguard15: entered promiscuous mode [ 1409.809837][T11403] wireguard15: entered allmulticast mode [ 1409.856348][T11400] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:22:15 executing program 4: shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x7000) r0 = shmget(0x3, 0x1000, 0x100, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_LOCK(r0, 0xb) shmget(0x0, 0x2000, 0x2, &(0x7f0000ffd000/0x2000)=nil) mlockall(0x5) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) shmat(r1, &(0x7f0000ffd000/0x2000)=nil, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000000)="ff5253fdf2c8de2ffa705950c5a11db8bf7e6ab5092940aeb9c0eab40395e296b1a2d8d1ec364ddcc87b8c0b32b8e77022e57d1cbdafc86bf4d52377acdb6f1de1f876f60598dc27023eef0ea9d3231fb042b6b505aa3b404562be31001ed95b57cde93160c5291804974ef239bc8c6aada77801818e24869633f83b48b2c97a7d1ca7cb08c22447e707116dddfed51fb10babadc513454aec0f5aa99af1da95b92951d83e00"/181) [ 1409.907030][T11400] wireguard12: entered promiscuous mode [ 1409.912619][T11400] wireguard12: entered allmulticast mode [ 1409.972785][T11410] wireguard48: entered promiscuous mode [ 1409.978387][T11410] wireguard48: entered allmulticast mode 03:22:15 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x7000) (async) r0 = shmget(0x3, 0x1000, 0x100, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_LOCK(r0, 0xb) (async) shmget(0x0, 0x2000, 0x2, &(0x7f0000ffd000/0x2000)=nil) (async) mlockall(0x5) (async) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) shmat(r1, &(0x7f0000ffd000/0x2000)=nil, 0x0) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000000)="ff5253fdf2c8de2ffa705950c5a11db8bf7e6ab5092940aeb9c0eab40395e296b1a2d8d1ec364ddcc87b8c0b32b8e77022e57d1cbdafc86bf4d52377acdb6f1de1f876f60598dc27023eef0ea9d3231fb042b6b505aa3b404562be31001ed95b57cde93160c5291804974ef239bc8c6aada77801818e24869633f83b48b2c97a7d1ca7cb08c22447e707116dddfed51fb10babadc513454aec0f5aa99af1da95b92951d83e00"/181) 03:22:15 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000003380000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:22:15 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef003200000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1410.085330][T11434] wireguard15: entered promiscuous mode [ 1410.090912][T11434] wireguard15: entered allmulticast mode [ 1410.123369][T11437] wireguard12: entered promiscuous mode [ 1410.128989][T11437] wireguard12: entered allmulticast mode 03:22:15 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef003900000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:22:15 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000390000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1410.249941][T11441] wireguard12: entered promiscuous mode [ 1410.255523][T11441] wireguard12: entered allmulticast mode [ 1410.288652][T11444] wireguard15: entered promiscuous mode [ 1410.294280][T11444] wireguard15: entered allmulticast mode [ 1411.556610][T11193] ================================================================== [ 1411.564696][T11193] BUG: KCSAN: data-race in blk_mq_dispatch_rq_list / blk_mq_dispatch_rq_list [ 1411.573443][T11193] [ 1411.575748][T11193] write to 0xffff888100c01ef8 of 4 bytes by task 11031 on cpu 0: [ 1411.583452][T11193] blk_mq_dispatch_rq_list+0xf4d/0x1090 [ 1411.588978][T11193] __blk_mq_sched_dispatch_requests+0x5ec/0xd20 [ 1411.595209][T11193] blk_mq_sched_dispatch_requests+0x99/0x100 [ 1411.601176][T11193] blk_mq_run_hw_queue+0x2a4/0x4c0 [ 1411.606270][T11193] blk_mq_flush_plug_list+0x7b6/0xdc0 [ 1411.611624][T11193] blk_add_rq_to_plug+0x108/0x3e0 [ 1411.616627][T11193] blk_mq_submit_bio+0x61a/0xd90 [ 1411.621544][T11193] __submit_bio+0x11c/0x350 [ 1411.626048][T11193] submit_bio_noacct_nocheck+0x4ad/0x5e0 [ 1411.631665][T11193] submit_bio_noacct+0x70c/0x8c0 [ 1411.636595][T11193] submit_bio+0xb7/0xc0 [ 1411.640736][T11193] ext4_bio_write_folio+0x6c0/0x9a0 [ 1411.645915][T11193] ext4_do_writepages+0x139f/0x2100 [ 1411.651095][T11193] ext4_writepages+0x15e/0x2e0 [ 1411.655845][T11193] do_writepages+0x1c2/0x340 [ 1411.660422][T11193] filemap_fdatawrite_wbc+0xdb/0xf0 [ 1411.665600][T11193] filemap_flush+0x95/0xc0 [ 1411.670010][T11193] ext4_alloc_da_blocks+0x50/0x130 [ 1411.675115][T11193] ext4_release_file+0x5f/0x1c0 [ 1411.679948][T11193] __fput+0x299/0x630 [ 1411.683919][T11193] ____fput+0x15/0x20 [ 1411.687898][T11193] task_work_run+0x135/0x1a0 [ 1411.692468][T11193] do_exit+0x604/0x16d0 [ 1411.696608][T11193] do_group_exit+0x101/0x150 [ 1411.701355][T11193] get_signal+0xf4e/0x10a0 [ 1411.705778][T11193] arch_do_signal_or_restart+0x95/0x4b0 [ 1411.711318][T11193] exit_to_user_mode_loop+0x6f/0xe0 [ 1411.716495][T11193] exit_to_user_mode_prepare+0x6c/0xb0 [ 1411.721937][T11193] irqentry_exit_to_user_mode+0x9/0x20 [ 1411.727376][T11193] irqentry_exit+0x12/0x40 [ 1411.731771][T11193] asm_exc_stack_segment+0x26/0x30 [ 1411.736863][T11193] [ 1411.739167][T11193] read to 0xffff888100c01ef8 of 4 bytes by task 11193 on cpu 1: [ 1411.746773][T11193] blk_mq_dispatch_rq_list+0xf30/0x1090 [ 1411.752312][T11193] __blk_mq_sched_dispatch_requests+0x1ce/0xd20 [ 1411.758557][T11193] blk_mq_sched_dispatch_requests+0x99/0x100 [ 1411.764534][T11193] blk_mq_run_hw_queue+0x2a4/0x4c0 [ 1411.769640][T11193] blk_mq_get_tag+0x479/0x590 [ 1411.774301][T11193] __blk_mq_alloc_requests+0x642/0x9e0 [ 1411.779749][T11193] blk_mq_submit_bio+0x468/0xd90 [ 1411.784670][T11193] __submit_bio+0x11c/0x350 [ 1411.789153][T11193] submit_bio_noacct_nocheck+0x449/0x5e0 [ 1411.794768][T11193] submit_bio_noacct+0x70c/0x8c0 [ 1411.799687][T11193] submit_bio+0xb7/0xc0 [ 1411.803846][T11193] ext4_bio_write_folio+0x6c0/0x9a0 [ 1411.809036][T11193] ext4_do_writepages+0x139f/0x2100 [ 1411.814222][T11193] ext4_writepages+0x15e/0x2e0 [ 1411.818977][T11193] do_writepages+0x1c2/0x340 [ 1411.823551][T11193] filemap_fdatawrite_wbc+0xdb/0xf0 [ 1411.828814][T11193] filemap_flush+0x95/0xc0 [ 1411.833206][T11193] ext4_alloc_da_blocks+0x50/0x130 [ 1411.838295][T11193] ext4_release_file+0x5f/0x1c0 [ 1411.843128][T11193] __fput+0x299/0x630 [ 1411.847093][T11193] ____fput+0x15/0x20 [ 1411.851057][T11193] task_work_run+0x135/0x1a0 [ 1411.855642][T11193] do_exit+0x604/0x16d0 [ 1411.859779][T11193] do_group_exit+0x101/0x150 [ 1411.864355][T11193] get_signal+0xf4e/0x10a0 [ 1411.868762][T11193] arch_do_signal_or_restart+0x95/0x4b0 [ 1411.874291][T11193] exit_to_user_mode_loop+0x6f/0xe0 [ 1411.879495][T11193] exit_to_user_mode_prepare+0x6c/0xb0 [ 1411.884940][T11193] irqentry_exit_to_user_mode+0x9/0x20 [ 1411.890378][T11193] irqentry_exit+0x12/0x40 [ 1411.894776][T11193] exc_general_protection+0x339/0x4c0 [ 1411.900133][T11193] asm_exc_general_protection+0x26/0x30 [ 1411.905661][T11193] [ 1411.907964][T11193] value changed: 0x00000007 -> 0x00000008 [ 1411.913658][T11193] [ 1411.915969][T11193] Reported by Kernel Concurrency Sanitizer on: [ 1411.922092][T11193] CPU: 1 PID: 11193 Comm: syz-executor.4 Not tainted 6.7.0-rc6-syzkaller-00044-g1a44b0073b92 #0 [ 1411.932479][T11193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1411.942515][T11193] ================================================================== 03:22:20 executing program 3: unshare(0x46060480) mlockall(0x1) (async) unshare(0x40000800) shmdt(0x0) syz_clone(0x82040000, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x0) 03:22:20 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef003a00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:22:20 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000003a0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:22:20 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x60, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:22:20 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x20, &(0x7f00000cf000/0x3000)=nil) shmat(r1, &(0x7f0000ffd000/0x2000)=nil, 0x1000) r2 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) unshare(0xa040300) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) set_mempolicy(0x3, 0x0, 0x3) (async) unshare(0x46060480) (async) shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) (async) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async) mlockall(0x2) (async) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) (async) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) (async) shmctl$IPC_RMID(0x0, 0x0) (async) shmget$private(0x0, 0x3000, 0x20, &(0x7f00000cf000/0x3000)=nil) (async) shmat(r1, &(0x7f0000ffd000/0x2000)=nil, 0x1000) (async) shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) (async) shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) (async) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) (async) unshare(0xa040300) (async) mlockall(0x5) (async) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) (async) [ 1415.372964][T11455] __nla_validate_parse: 6 callbacks suppressed [ 1415.372978][T11455] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:22:20 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x7000) (async, rerun: 32) r0 = shmget(0x3, 0x1000, 0x100, &(0x7f0000ffe000/0x1000)=nil) (rerun: 32) shmctl$SHM_LOCK(r0, 0xb) shmget(0x0, 0x2000, 0x2, &(0x7f0000ffd000/0x2000)=nil) mlockall(0x5) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) (async, rerun: 32) shmat(r1, &(0x7f0000ffd000/0x2000)=nil, 0x0) (async, rerun: 32) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000000)="ff5253fdf2c8de2ffa705950c5a11db8bf7e6ab5092940aeb9c0eab40395e296b1a2d8d1ec364ddcc87b8c0b32b8e77022e57d1cbdafc86bf4d52377acdb6f1de1f876f60598dc27023eef0ea9d3231fb042b6b505aa3b404562be31001ed95b57cde93160c5291804974ef239bc8c6aada77801818e24869633f83b48b2c97a7d1ca7cb08c22447e707116dddfed51fb10babadc513454aec0f5aa99af1da95b92951d83e00"/181) [ 1415.446870][T11455] wireguard12: entered promiscuous mode [ 1415.452448][T11455] wireguard12: entered allmulticast mode [ 1415.502140][T11458] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1415.515277][T11458] wireguard15: entered promiscuous mode [ 1415.520926][T11458] wireguard15: entered allmulticast mode [ 1415.537982][T11464] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1415.547214][T11464] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1415.560304][T11464] wireguard49: entered promiscuous mode [ 1415.565883][T11464] wireguard49: entered allmulticast mode 03:22:20 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef004400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:22:20 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000003f0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:22:20 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x1000, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 1415.705462][T11484] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1415.746196][T11484] wireguard12: entered promiscuous mode [ 1415.751808][T11484] wireguard12: entered allmulticast mode [ 1415.839366][T11487] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1415.873886][T11487] wireguard15: entered promiscuous mode [ 1415.879465][T11487] wireguard15: entered allmulticast mode 03:22:21 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef004800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:22:21 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000400000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:22:21 executing program 4: shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) syz_clone(0x1000, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 1415.998897][T11497] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1416.011465][T11497] wireguard12: entered promiscuous mode [ 1416.017074][T11497] wireguard12: entered allmulticast mode [ 1416.042281][T11500] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1416.056673][T11500] wireguard15: entered promiscuous mode [ 1416.062344][T11500] wireguard15: entered allmulticast mode 03:22:21 executing program 3: unshare(0x46060480) mlockall(0x1) (async) unshare(0x40000800) (async) shmdt(0x0) (async) syz_clone(0x82040000, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x0) 03:22:21 executing program 4: shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x1000, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) (async) syz_clone(0x1000, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) (async) 03:22:21 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef004c00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:22:21 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x68, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:22:21 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000002400000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:22:21 executing program 5: unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) unshare(0x8010000) shmat(r0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) unshare(0x4000000) [ 1416.784810][T11512] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1416.798337][T11512] wireguard12: entered promiscuous mode [ 1416.803948][T11512] wireguard12: entered allmulticast mode [ 1416.823336][T11513] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1416.837327][T11513] wireguard15: entered promiscuous mode [ 1416.842922][T11513] wireguard15: entered allmulticast mode [ 1416.885465][T11527] wireguard50: entered promiscuous mode [ 1416.891030][T11527] wireguard50: entered allmulticast mode 03:22:22 executing program 5: unshare(0x46060480) (async) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async) mlockall(0x2) (async) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) (async) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) (async) shmctl$IPC_RMID(0x0, 0x0) (async) shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) (async) unshare(0x8010000) (async) shmat(r0, &(0x7f00000f5000/0x4000)=nil, 0x0) (async) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) (async) unshare(0x4000000) 03:22:22 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef005600000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:22:22 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000440000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) [ 1417.016736][T11538] wireguard15: entered promiscuous mode [ 1417.022386][T11538] wireguard15: entered allmulticast mode [ 1417.068717][T11539] wireguard12: entered promiscuous mode [ 1417.074416][T11539] wireguard12: entered allmulticast mode 03:22:22 executing program 4: lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x3) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:22:22 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000001440000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:22:22 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef006000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) [ 1417.204609][T11550] wireguard15: entered promiscuous mode [ 1417.210193][T11550] wireguard15: entered allmulticast mode [ 1417.276540][T11554] wireguard12: entered promiscuous mode [ 1417.282131][T11554] wireguard12: entered allmulticast mode 03:22:22 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000ee470000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:22:22 executing program 4: lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x3) (async) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:22:22 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef006800000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:22:22 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 03:22:22 executing program 3: unshare(0x46060480) mlockall(0x1) shmdt(0x0) syz_clone(0xc4100000, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x48000800) unshare(0x40000000) mlockall(0x0) [ 1417.829638][T11563] wireguard15: entered promiscuous mode [ 1417.835319][T11563] wireguard15: entered allmulticast mode [ 1417.848990][T11562] wireguard12: entered promiscuous mode [ 1417.854654][T11562] wireguard12: entered allmulticast mode 03:22:23 executing program 5: unshare(0x46060480) (async) unshare(0x46060480) shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) (async) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) (async) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(0x0, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) (async) shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) unshare(0x8010000) shmat(r0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) unshare(0x4000000) [ 1417.882173][T11571] wireguard51: entered promiscuous mode [ 1417.887808][T11571] wireguard51: entered allmulticast mode 03:22:23 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef006c00000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:22:23 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000480000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:22:23 executing program 5: set_mempolicy(0x3, 0x0, 0x3) unshare(0x46060480) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) mlockall(0x2) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) set_mempolicy(0x8000, &(0x7f0000000040)=0x4, 0x13ccac6) shmctl$SHM_UNLOCK(r1, 0xc) shmctl$SHM_UNLOCK(r1, 0xc) shmctl$IPC_RMID(0x0, 0x0) r2 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) mlockall(0x5) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) [ 1418.069605][T11582] wireguard12: entered promiscuous mode [ 1418.075270][T11582] wireguard12: entered allmulticast mode [ 1418.102105][T11584] wireguard15: entered promiscuous mode [ 1418.107706][T11584] wireguard15: entered allmulticast mode 03:22:23 executing program 5: set_mempolicy(0x3, 0x0, 0x3) (async) unshare(0x46060480) (async) r0 = shmget$private(0x0, 0x400000, 0x200, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) (async) mlockall(0x2) (async) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) (async) shmat(0x0, &(0x7f000018b000/0x1000)=nil, 0x5000) (async) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) set_mempolicy(0x8000, &(0x7f0000000040)=0x4, 0x13ccac6) (async) shmctl$SHM_UNLOCK(r1, 0xc) shmctl$SHM_UNLOCK(r1, 0xc) shmctl$IPC_RMID(0x0, 0x0) (async) r2 = shmget$private(0x0, 0x3000, 0x200, &(0x7f000031c000/0x3000)=nil) shmat(r2, &(0x7f0000256000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f00000f5000/0x4000)=nil, 0x0) (async) mlockall(0x5) (async) syz_clone(0x82040000, &(0x7f0000000100)="f8c5d6d35b29830c435ee03fb26d16e9c2c42ae95ed14e238992a910fbbca2ebb5bd6032becc4e4b4160a75c2aaf39df7320ad4ef269b1754cf086c8bcd735308815904220ffc84af3bd40e14e0f95484762af3b09b78f4916344eeeb5b6c6cf1ca96c386af3c51d615600e1213193b298d90ca288160250188e1f806e1c47c20ea71284f9114b923cbd2e6e7a2059e1a836b0aae764f9b649f80ae8fd62a193fe59f3c73dbbacdcd4c01d005322ec72030d11f64a9a22dbbf0152132727431e0c40c41c1552f9408b260867f1a2eb7c1b2d75aac9738fd55b05129c854cecde09b97ac296bbdda7eccf", 0xea, &(0x7f0000000000), &(0x7f0000000080), 0x0) 03:22:23 executing program 3: unshare(0x46060480) (async) unshare(0x46060480) mlockall(0x1) shmdt(0x0) (async) shmdt(0x0) syz_clone(0xc4100000, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x48000800) unshare(0x40000000) mlockall(0x0) 03:22:23 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef007400000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) 03:22:23 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef0000004c0000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000381028008000a00", @ANYRES32], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) 03:22:26 executing program 4: lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x3) shmctl$IPC_RMID(0x0, 0x0) mlockall(0x1) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x3) (async) shmctl$IPC_RMID(0x0, 0x0) (async) mlockall(0x1) (async) syz_clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000200)) (async) 03:22:26 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x74, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="4000000010001fef000000000000f4f30900e2ff", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000", @ANYBLOB], 0x40}}, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1421.534299][T11597] __nla_validate_parse: 12 callbacks suppressed [ 1421.534310][T11597] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'.