Warning: Permanently added '10.128.0.161' (ECDSA) to the list of known hosts. 2020/06/20 07:02:46 fuzzer started 2020/06/20 07:02:46 dialing manager at 10.128.0.26:46835 2020/06/20 07:02:46 syscalls: 2928 2020/06/20 07:02:46 code coverage: enabled 2020/06/20 07:02:46 comparison tracing: enabled 2020/06/20 07:02:46 extra coverage: enabled 2020/06/20 07:02:46 setuid sandbox: enabled 2020/06/20 07:02:46 namespace sandbox: enabled 2020/06/20 07:02:46 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/20 07:02:46 fault injection: enabled 2020/06/20 07:02:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/20 07:02:46 net packet injection: enabled 2020/06/20 07:02:46 net device setup: enabled 2020/06/20 07:02:46 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/06/20 07:02:46 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/20 07:02:46 USB emulation: enabled 07:04:30 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="340000001000"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000000c002b80080001001f68caf52aacacd17c808bfa54edbeab6574142b28ad19b5ff2bd85abb00100000000000006aeb896111b7539c388c69b22a098b46be8a8319cdcbc9d124becfe1f4d22b38eb", @ANYRES32, @ANYBLOB="08001b0000000000"], 0x34}}, 0x0) io_setup(0x202, &(0x7f00000004c0)=0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000540)=[{}, {}], &(0x7f0000000100)={0x0, 0x989680}) syzkaller login: [ 160.407359][ T6811] IPVS: ftp: loaded support on port[0] = 21 07:04:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000100)={0x0, 0x1e2}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x4, 0x0, 0x40000007, 0x100, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 160.565219][ T6811] chnl_net:caif_netlink_parms(): no params data found [ 160.667805][ T6811] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.695101][ T6811] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.698933][ T6941] IPVS: ftp: loaded support on port[0] = 21 [ 160.710530][ T6811] device bridge_slave_0 entered promiscuous mode [ 160.728904][ T6811] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.736580][ T6811] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.746171][ T6811] device bridge_slave_1 entered promiscuous mode [ 160.800317][ T6811] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 160.829269][ T6811] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 07:04:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, 0x0, 0x44000) r1 = socket$inet6_udp(0xa, 0x2, 0x0) close(r1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507feff05110000000000000000", @ANYRES32=0x0, @ANYBLOB="0009000000190000140012800c0001006d61637674617000040002800a000500140000000000000008000a00", @ANYRES32=r2], 0x48}}, 0x0) [ 160.888891][ T6811] team0: Port device team_slave_0 added [ 160.923523][ T6811] team0: Port device team_slave_1 added [ 161.014142][ T6941] chnl_net:caif_netlink_parms(): no params data found [ 161.055937][ T6811] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 161.062918][ T6811] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 161.135036][ T6811] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 161.178417][ T6811] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 161.194536][ T6811] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:04:31 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000407097d202d47d1b000500010006"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fda, 0x0) [ 161.231505][ T7079] IPVS: ftp: loaded support on port[0] = 21 [ 161.246850][ T6811] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 161.387846][ T6811] device hsr_slave_0 entered promiscuous mode [ 161.444414][ T6811] device hsr_slave_1 entered promiscuous mode [ 161.467756][ T7115] IPVS: ftp: loaded support on port[0] = 21 [ 161.490736][ T6941] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.500440][ T6941] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.509062][ T6941] device bridge_slave_0 entered promiscuous mode [ 161.549559][ T6941] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.560150][ T6941] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.569362][ T6941] device bridge_slave_1 entered promiscuous mode 07:04:31 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x2, 0x1) [ 161.690971][ T6941] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 161.706682][ T6941] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 161.772479][ T6941] team0: Port device team_slave_0 added [ 161.815574][ T6941] team0: Port device team_slave_1 added [ 161.949295][ T6941] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 161.982730][ T6941] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 162.046363][ T6941] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 07:04:31 executing program 5: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) madvise(&(0x7f00001a3000/0x4000)=nil, 0x4000, 0x15) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r0, r1, 0x0, 0x100000080006c00) [ 162.154840][ T6941] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 162.161822][ T6941] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 162.207314][ T7319] IPVS: ftp: loaded support on port[0] = 21 [ 162.220877][ T6941] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 162.253355][ T7329] IPVS: ftp: loaded support on port[0] = 21 [ 162.286735][ T7079] chnl_net:caif_netlink_parms(): no params data found [ 162.368412][ T6941] device hsr_slave_0 entered promiscuous mode [ 162.424497][ T6941] device hsr_slave_1 entered promiscuous mode [ 162.484113][ T6941] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 162.491838][ T6941] Cannot create hsr debugfs directory [ 162.508107][ T6811] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 162.558659][ T6811] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 162.619451][ T6811] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 162.687252][ T7115] chnl_net:caif_netlink_parms(): no params data found [ 162.733724][ T6811] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 162.912337][ T7115] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.920573][ T7115] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.929096][ T7115] device bridge_slave_0 entered promiscuous mode [ 162.943993][ T7115] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.951062][ T7115] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.961351][ T7115] device bridge_slave_1 entered promiscuous mode [ 163.013542][ T7079] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.024133][ T7079] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.031884][ T7079] device bridge_slave_0 entered promiscuous mode [ 163.041903][ T7079] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.049319][ T7079] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.058434][ T7079] device bridge_slave_1 entered promiscuous mode [ 163.121608][ T7115] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.140891][ T7115] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.192800][ T7079] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.253348][ T7079] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.348017][ T7115] team0: Port device team_slave_0 added [ 163.387054][ T7329] chnl_net:caif_netlink_parms(): no params data found [ 163.400807][ T7115] team0: Port device team_slave_1 added [ 163.424292][ T7319] chnl_net:caif_netlink_parms(): no params data found [ 163.446604][ T7079] team0: Port device team_slave_0 added [ 163.473492][ T7115] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 163.484752][ T7115] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 163.511910][ T7115] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 163.528751][ T7115] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 163.535853][ T7115] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 163.563236][ T7115] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 163.586374][ T7079] team0: Port device team_slave_1 added [ 163.652921][ T6941] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 163.713565][ T6941] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 163.816969][ T7115] device hsr_slave_0 entered promiscuous mode [ 163.864495][ T7115] device hsr_slave_1 entered promiscuous mode [ 163.924244][ T7115] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 163.931783][ T7115] Cannot create hsr debugfs directory [ 163.941844][ T6941] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 163.986419][ T7079] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 163.993401][ T7079] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 164.020506][ T7079] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 164.040255][ T6811] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.058135][ T6941] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 164.106758][ T7079] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 164.113732][ T7079] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 164.143504][ T7079] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 164.191193][ T7329] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.199320][ T7329] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.209536][ T7329] device bridge_slave_0 entered promiscuous mode [ 164.259984][ T7329] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.269706][ T7329] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.280788][ T7329] device bridge_slave_1 entered promiscuous mode [ 164.301833][ T6811] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.318342][ T7319] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.325747][ T7319] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.333693][ T7319] device bridge_slave_0 entered promiscuous mode [ 164.349146][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.360096][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.418400][ T7079] device hsr_slave_0 entered promiscuous mode [ 164.484843][ T7079] device hsr_slave_1 entered promiscuous mode [ 164.554346][ T7079] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 164.561886][ T7079] Cannot create hsr debugfs directory [ 164.588892][ T7319] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.597074][ T7319] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.605310][ T7319] device bridge_slave_1 entered promiscuous mode [ 164.622620][ T7329] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.661076][ T7329] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 164.682822][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.693899][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.702931][ T2728] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.710220][ T2728] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.751744][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.762627][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.771719][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.781102][ T2728] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.788208][ T2728] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.801358][ T7319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.822637][ T7319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 164.883348][ T7329] team0: Port device team_slave_0 added [ 164.891504][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.901640][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.923171][ T7319] team0: Port device team_slave_0 added [ 164.949182][ T7329] team0: Port device team_slave_1 added [ 164.967875][ T7319] team0: Port device team_slave_1 added [ 164.981478][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.990951][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.000273][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.010926][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.020343][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.041486][ T6811] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 165.052885][ T6811] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 165.097711][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.106763][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.117060][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.126815][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.136212][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.147462][ T7329] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 165.154638][ T7329] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.181029][ T7329] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 165.200496][ T7319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 165.209740][ T7319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.237984][ T7319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 165.267852][ T7329] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 165.275936][ T7329] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.303366][ T7329] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 165.317701][ T7319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 165.328638][ T7319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.360344][ T7319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 165.421995][ T7115] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 165.511283][ T7329] device hsr_slave_0 entered promiscuous mode [ 165.555670][ T7329] device hsr_slave_1 entered promiscuous mode [ 165.594405][ T7329] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 165.601987][ T7329] Cannot create hsr debugfs directory [ 165.617760][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 165.625267][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 165.633858][ T7115] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 165.687389][ T7115] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 165.777973][ T7319] device hsr_slave_0 entered promiscuous mode [ 165.834694][ T7319] device hsr_slave_1 entered promiscuous mode [ 165.895163][ T7319] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 165.902781][ T7319] Cannot create hsr debugfs directory [ 165.919970][ T6941] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.933549][ T7115] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 165.992142][ T6811] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.113654][ T6941] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.141352][ T7079] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 166.179790][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.187789][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.220158][ T7079] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 166.300959][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.310691][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.320736][ T2507] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.327865][ T2507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.336416][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.345621][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.353986][ T2507] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.361147][ T2507] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.368947][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.378969][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 166.388567][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 166.397870][ T7079] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 166.451812][ T7079] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 166.557915][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.566090][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.576284][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 166.586527][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.596274][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.604036][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.631338][ T6811] device veth0_vlan entered promiscuous mode [ 166.668999][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.679769][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.712777][ T6811] device veth1_vlan entered promiscuous mode [ 166.750188][ T7319] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 166.787801][ T7319] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 166.858274][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 166.867133][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.875676][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.884613][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.893029][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.901986][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.942257][ T7319] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 167.011751][ T7319] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 167.079466][ T6941] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 167.090690][ T6941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.103549][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 167.112071][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.121669][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.181278][ T7115] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.192095][ T7329] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 167.248648][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 167.258224][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 167.275510][ T6811] device veth0_macvtap entered promiscuous mode [ 167.303562][ T7329] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 167.366968][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 167.379283][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.388056][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.405211][ T7115] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.418321][ T7329] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 167.476593][ T6811] device veth1_macvtap entered promiscuous mode [ 167.483902][ T7329] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 167.564894][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 167.572894][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 167.581031][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 167.589976][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.599125][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.608096][ T2507] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.615227][ T2507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.625341][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.658251][ T6941] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.666871][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.677741][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.686639][ T2730] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.693669][ T2730] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.711843][ T6811] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 167.738259][ T7079] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.755651][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.765874][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 167.774995][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 167.783509][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.798241][ T6811] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 167.835341][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 167.844081][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 167.859602][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.868825][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.878848][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.887859][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.933246][ T7079] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.942344][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.951376][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 167.960561][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 167.969702][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.978509][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.987669][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.996543][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.005070][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.012749][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.084695][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.158591][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.167675][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.180141][ T2484] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.187315][ T2484] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.195108][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.203651][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.212276][ T2484] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.219432][ T2484] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.227415][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 168.236293][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 168.268141][ T6941] device veth0_vlan entered promiscuous mode [ 168.340572][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 168.355524][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 168.363474][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 168.373657][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 168.383795][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.412974][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.423578][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.446731][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.455709][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 168.467021][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.490603][ T6941] device veth1_vlan entered promiscuous mode [ 168.521012][ T7115] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.540702][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 168.550499][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 07:04:38 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="340000001000"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000000c002b80080001001f68caf52aacacd17c808bfa54edbeab6574142b28ad19b5ff2bd85abb00100000000000006aeb896111b7539c388c69b22a098b46be8a8319cdcbc9d124becfe1f4d22b38eb", @ANYRES32, @ANYBLOB="08001b0000000000"], 0x34}}, 0x0) io_setup(0x202, &(0x7f00000004c0)=0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000540)=[{}, {}], &(0x7f0000000100)={0x0, 0x989680}) [ 168.571794][ T7319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.595810][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.622852][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.648460][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.657520][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.680711][ T7079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.755494][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.765736][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.780876][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 168.792098][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 07:04:38 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe721, 0x4}, 0x18002, 0xfffffffffffffff9, 0xbb06, 0x0, 0x0, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mkdir(&(0x7f0000000040)='./file0\x00', 0x102) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) r0 = socket(0x1d, 0x0, 0xfffffffc) ioctl$sock_ifreq(0xffffffffffffffff, 0x39, &(0x7f0000000040)={'vxcan1\x00', @ifru_data=&(0x7f00000002c0)="370df5673cc44958532b30997230251af86a8151f924869fb4b60399fed3f0d6"}) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) chdir(&(0x7f0000000140)='./file0\x00') times(&(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) rmdir(&(0x7f0000000100)='./file0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000280)={@mcast1, 0x34}) r2 = dup(r1) mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x11) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f0000000180)=0x8) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 168.822257][ T7319] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.883842][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.905053][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.926548][ T2728] bridge0: port 1(bridge_slave_0) entered blocking state 07:04:38 executing program 0: 07:04:38 executing program 0: [ 168.933643][ T2728] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.964620][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 168.973080][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 168.995557][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 169.031695][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 07:04:38 executing program 0: 07:04:38 executing program 0: [ 169.051579][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 169.075382][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 169.083304][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 07:04:38 executing program 0: [ 169.179912][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.200367][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.224810][ T2732] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.231914][ T2732] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.240927][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.253167][ T7115] device veth0_vlan entered promiscuous mode [ 169.261790][ T6941] device veth0_macvtap entered promiscuous mode [ 169.279134][ T7329] 8021q: adding VLAN 0 to HW filter on device bond0 [ 169.294641][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 169.302141][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 169.332371][ T7115] device veth1_vlan entered promiscuous mode [ 169.360297][ T7079] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 169.377911][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.391005][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.400352][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.409377][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 169.418521][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.428912][ T6941] device veth1_macvtap entered promiscuous mode [ 169.452388][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.466139][ T7329] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.493038][ T6941] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 169.510157][ T6941] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.522610][ T6941] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 169.538215][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.547315][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.561733][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.570739][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.582984][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 169.593225][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.608264][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 169.617180][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 169.638207][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 169.650861][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.663102][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.672582][ T2507] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.679806][ T2507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.690347][ T6941] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 169.702192][ T6941] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.715001][ T6941] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 169.750484][ T7115] device veth0_macvtap entered promiscuous mode [ 169.770515][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 169.781577][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 169.790870][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 169.800142][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 169.809422][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 169.818594][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 169.827607][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 169.836521][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.845512][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.853848][ T2507] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.860953][ T2507] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.893317][ T7115] device veth1_macvtap entered promiscuous mode [ 169.909455][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 169.918288][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 169.927046][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.968366][ T7079] device veth0_vlan entered promiscuous mode [ 169.976808][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.989298][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 169.998454][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.007428][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 170.016308][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 170.025782][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 170.033186][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 170.041103][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.049596][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 170.058499][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 170.092634][ T7079] device veth1_vlan entered promiscuous mode [ 170.101939][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 170.112140][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 170.128468][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.138500][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.150408][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.161997][ T7319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.169689][ T7115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 170.180268][ T7115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.190302][ T7115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 170.202487][ T7115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.215480][ T7115] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 170.272756][ T7329] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 170.284092][ T7329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.307091][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 170.316601][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 170.326136][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 170.336601][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.345048][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.358105][ T7115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.371370][ T7115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.382167][ T7115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.393323][ T7115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.405450][ T7115] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 170.475387][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 170.485577][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 170.582828][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 170.593152][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 170.609275][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 170.620962][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 170.663502][ T8087] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 170.728528][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000040 data 0x10000000006 [ 170.744485][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000053 data 0x100000000e1 [ 170.765142][ T7079] device veth0_macvtap entered promiscuous mode [ 170.779932][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000011 data 0x1000000004c [ 170.810246][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000067 data 0x10000000046 [ 170.812912][ T7329] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.822069][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000001e data 0x10000000066 [ 170.841179][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000078 data 0x10000000071 [ 170.852162][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 170.861905][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 170.870959][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000000b data 0x10000000019 [ 170.881468][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 170.889120][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000026 data 0x10000000004 [ 170.904122][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000089 data 0x10000000027 [ 170.916382][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000014 data 0x10000000011 [ 170.972902][ T7319] device veth0_vlan entered promiscuous mode [ 170.987145][ T7079] device veth1_macvtap entered promiscuous mode [ 171.045462][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 171.053648][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 171.069814][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.100643][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.132606][ T8104] netlink: 168 bytes leftover after parsing attributes in process `syz-executor.3'. [ 171.141231][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 07:04:40 executing program 1: [ 171.177698][ T7319] device veth1_vlan entered promiscuous mode [ 171.244268][ T7079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 171.257417][ T7079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.275143][ T7079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 171.286845][ T7079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.296844][ T7079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 171.308342][ T7079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.332163][ T7079] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 171.349983][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 171.366307][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 171.382214][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 171.391436][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 171.402208][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 171.413439][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 171.455045][ T7079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.479164][ T7079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.494671][ T7079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.506586][ T7079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.516500][ T7079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.527020][ T7079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.539138][ T7079] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 171.566165][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 171.577119][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 171.587173][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 171.598869][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.614792][ T7329] device veth0_vlan entered promiscuous mode [ 171.632755][ T7319] device veth0_macvtap entered promiscuous mode [ 171.640924][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.649397][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.658608][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 171.668316][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 171.743476][ T7319] device veth1_macvtap entered promiscuous mode [ 171.756412][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 171.766004][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 171.777535][ T7329] device veth1_vlan entered promiscuous mode [ 171.936255][ T7319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 171.954641][ T7319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.966508][ T7319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 171.977846][ T7319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.989415][ T7319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.001120][ T7319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.012687][ T7319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.024097][ T7319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.046903][ T7319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 172.091034][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 172.100649][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 172.110160][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 172.120898][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.135963][ T7319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.149971][ T7319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.161441][ T7319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.173907][ T7319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.185229][ T7319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.197901][ T7319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.209416][ T7319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.220850][ T7319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.233076][ T7319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 172.246822][ T8113] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 172.259490][ T8113] device macvtap1 entered promiscuous mode [ 172.270001][ T8113] device batadv0 entered promiscuous mode [ 172.279901][ T8113] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 172.287426][ T8113] team0: Device macvtap1 failed to register rx_handler [ 172.295861][ T8113] device batadv0 left promiscuous mode [ 172.522562][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 172.531669][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 172.541964][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 172.551639][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 172.567284][ T7329] device veth0_macvtap entered promiscuous mode [ 172.589229][ T7329] device veth1_macvtap entered promiscuous mode [ 172.672133][ T8113] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 172.684036][ T8113] device macvtap1 entered promiscuous mode [ 172.691091][ T8113] device batadv0 entered promiscuous mode [ 172.698676][ T8113] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 172.708046][ T8113] team0: Device macvtap1 failed to register rx_handler [ 172.716996][ T8113] device batadv0 left promiscuous mode 07:04:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, 0x0, 0x44000) r1 = socket$inet6_udp(0xa, 0x2, 0x0) close(r1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507feff05110000000000000000", @ANYRES32=0x0, @ANYBLOB="0009000000190000140012800c0001006d61637674617000040002800a000500140000000000000008000a00", @ANYRES32=r2], 0x48}}, 0x0) 07:04:42 executing program 0: [ 173.029099][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 173.055849][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.095090][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 173.135324][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 07:04:42 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) lseek(r0, 0x2, 0x1) [ 173.192781][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 173.214698][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.231647][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 173.243667][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.261936][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 173.299190][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.320767][ T7329] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 173.336074][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 173.347262][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.358077][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 173.369333][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.380541][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 173.421827][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.443651][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 173.466031][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.476555][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 173.487614][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.500300][ T7329] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 173.510353][ T8132] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 173.529364][ T8132] device macvtap1 entered promiscuous mode [ 173.536129][ T8132] device batadv0 entered promiscuous mode [ 173.543813][ T8132] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 173.554248][ T8132] team0: Device macvtap1 failed to register rx_handler [ 173.566810][ T8132] device batadv0 left promiscuous mode [ 173.701225][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 173.717187][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 173.732210][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 173.745099][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 173.765937][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 07:04:43 executing program 5: 07:04:43 executing program 1: 07:04:43 executing program 3: 07:04:43 executing program 0: 07:04:43 executing program 4: 07:04:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, 0x0, 0x44000) r1 = socket$inet6_udp(0xa, 0x2, 0x0) close(r1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507feff05110000000000000000", @ANYRES32=0x0, @ANYBLOB="0009000000190000140012800c0001006d61637674617000040002800a000500140000000000000008000a00", @ANYRES32=r2], 0x48}}, 0x0) 07:04:43 executing program 4: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice\x00', 0x0) close(r0) syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x0, 0x0) 07:04:43 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f00002dd000/0x1000)=nil, 0x3) 07:04:43 executing program 1: syz_emit_ethernet(0xec, &(0x7f0000000280)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209240", 0xb6, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}, {"e18769c9382865976ffec29e627ede782cf0ed3cd656ab1763f62ae996bd645ed06d3ef7b7f70e688421e135fcf068ea5ef96f1278bdfdd7e732999d988dd48beb8a50a220c58eccbae707c0c39ced17767521dbbf804bf75f8e1979b13414d9a9a648e29bdfc35500d79439eabe2f01ecea2ad88f896f26102542ccb82de0d2d5eaf758352b50a003a8970d6a4eafa6792e8786dc5232fa1c6ed4c2906f3caf8528"}}}}}}}, 0x0) 07:04:43 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$getflags(r1, 0x401) [ 174.174289][ T8156] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 07:04:43 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x4}) 07:04:44 executing program 0: getpid() perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26) read$midi(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000000) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0) [ 174.254126][ T8156] device macvtap1 entered promiscuous mode [ 174.283424][ T8156] device batadv0 entered promiscuous mode 07:04:44 executing program 3: getrlimit(0x271ed26218092102, 0x0) [ 174.318047][ T8156] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 174.352734][ T8156] team0: Device macvtap1 failed to register rx_handler 07:04:44 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfec0000000000000], [], @local}}, @in={0x2, 0x0, @remote}], 0x2c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e22, @remote}], 0x10) listen(r0, 0x0) 07:04:44 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=ANY=[@ANYBLOB="7800000024000b1000"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000100736671004c0002"], 0x78}}, 0x0) [ 174.384228][ T8169] syz-executor.1 (8169) used greatest stack depth: 22832 bytes left [ 174.407455][ T8156] device batadv0 left promiscuous mode 07:04:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:44 executing program 0: getpid() perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26) read$midi(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000000) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0) [ 174.581149][ C1] hrtimer: interrupt took 49325 ns 07:04:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, 0x0, 0x44000) r1 = socket$inet6_udp(0xa, 0x2, 0x0) close(r1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507feff05110000000000000000", @ANYRES32=0x0, @ANYBLOB="0009000000190000140012800c0001006d61637674617000040002800a000500140000000000000008000a00", @ANYRES32=r2], 0x48}}, 0x0) 07:04:44 executing program 4: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice\x00', 0x0) close(r0) syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x0, 0x0) 07:04:44 executing program 1: r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = getpid() ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmmsg(r2, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 07:04:44 executing program 0: getpid() perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26) read$midi(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000000) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0) 07:04:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfec0000000000000], [], @local}}, @in={0x2, 0x0, @remote}], 0x2c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x65, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}], 0x1c) 07:04:44 executing program 0: getpid() perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26) read$midi(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000000) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0) [ 175.163104][ T8213] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 07:04:44 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0xffffffff, 0x0) mlock(&(0x7f0000ad9000/0x3000)=nil, 0x3000) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x0) mbind(&(0x7f0000931000/0xe000)=nil, 0xe000, 0x0, 0x0, 0x0, 0x0) 07:04:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x4e00) openat$mixer(0xffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x8000, 0x0) open(0x0, 0x0, 0x88) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') socket(0x0, 0x805, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000100), 0x4) [ 175.248574][ T8213] device macvtap1 entered promiscuous mode [ 175.282093][ T8213] device batadv0 entered promiscuous mode [ 175.301976][ T8222] mmap: syz-executor.5 (8222) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 175.316098][ T8213] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 175.352281][ T8213] team0: Device macvtap1 failed to register rx_handler 07:04:45 executing program 0: getpid() perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26) read$midi(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000000) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) [ 175.408954][ T8213] device batadv0 left promiscuous mode 07:04:45 executing program 5: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f00002dd000/0x1000)=nil, 0x2) 07:04:46 executing program 2: getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x200040000000015, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000005c0)="7ce6b3d9dad669517d33bc02b93b02c4fd3cf4e27d55f16e80394cb62297e7e8acfa71fe38e7178867ebe04b7e2b3dd37380f9f82124d8831048a582a042641577877fee3185d74793010702000068cf83f3a58407d7569ba8596226e8c8f8111c2050a32556ce8dfa56fd4a5982b732e66866c7b0f82a1d11b1586fb80ff70fd6ce88aac125244af610348cf442e43c3356460a596df9f6db6f5927289dc8390356faf857038de8b6ceb8712aa3982bf218e09f2334d1ce515007b679e1bdf6b3febf13fc4a9361c2172cc606f52cdbeac9bea165791e70c26c7d5a2fec944f49ad5b5e02622c1298aa6f1c8ae6ae5835c849fe8855c68e335539ef9f709564bc4642eeb44236b48b5d1517ae34a27853a0cc8bb4f1a4608ded848ad09495cd3dc599f2217b76ef26592809ac779c2619f0a9714cfefa455b4499cd0b7bfac11efc71cef248c80d3db967fcdcd303518f1140018bedb29eafb7fcafd093ca37ab98aef406bad7bebe7ac14be768e0d6886c6965", 0x174, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0) 07:04:46 executing program 5: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) madvise(&(0x7f00001a3000/0x4000)=nil, 0x4000, 0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x434f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x2000000000002) syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') pipe(&(0x7f0000000280)) syz_open_procfs(0x0, 0x0) r0 = shmget(0x3, 0x3000, 0x78000200, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) pipe(&(0x7f0000000280)) shmat(0x0, &(0x7f0000340000/0x3000)=nil, 0x7000) 07:04:46 executing program 0: getpid() perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26) read$midi(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:46 executing program 4: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) madvise(&(0x7f00001a3000/0x4000)=nil, 0x4000, 0x15) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f00005db000/0x2000)=nil) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r1, r2, 0x0, 0x100000080006c00) shmat(r0, &(0x7f0000340000/0x3000)=nil, 0x7000) 07:04:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:46 executing program 5: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) madvise(&(0x7f00001a3000/0x4000)=nil, 0x4000, 0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x434f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x2000000000002) syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') pipe(&(0x7f0000000280)) syz_open_procfs(0x0, 0x0) r0 = shmget(0x3, 0x3000, 0x78000200, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) pipe(&(0x7f0000000280)) shmat(0x0, &(0x7f0000340000/0x3000)=nil, 0x7000) 07:04:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) [ 176.949388][ T8269] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 07:04:46 executing program 0: getpid() perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26) read$midi(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:04:46 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000040)) 07:04:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:46 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f00000004c0)=[{{&(0x7f0000000000)={0x2, 0x4e24, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x10}}], 0x10}}], 0x1, 0x0) 07:04:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)={0x7}) 07:04:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:04:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40442}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 07:04:47 executing program 0: getpid() perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:47 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioprio_set$uid(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 07:04:47 executing program 0: getpid() perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) 07:04:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000) 07:04:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:04:47 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000340)) 07:04:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:47 executing program 0: getpid() perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:47 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendfile(r0, r1, 0x0, 0x4000000000010046) 07:04:48 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaeb00aaaabb86dd6020920000140600fe8000f10000000000000000000000bb00000000000000000000ffffffffffff000000006b6d1ad3d184d60967"], 0x0) 07:04:48 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e28, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000001980), 0x8c83086635fae290, 0x2000f760) 07:04:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:48 executing program 0: getpid() perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:48 executing program 5: socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000) 07:04:48 executing program 4: socket$inet6(0xa, 0x1, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) eventfd2(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000000100), 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f00000002c0)='./bus\x00', 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r3, 0x89f0, &(0x7f0000000200)={'bridge0\x00', &(0x7f0000000140)=ANY=[@ANYRES64=r2]}) 07:04:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe3, &(0x7f00000193c0)="d3d763180dee636b7be929f7f249b9740c9e57f43d26af000000008a58480aa4cefdda3611f88416f5bd2ceef2611ab2c8e87610d02b8832952dd136bd6f0200009f8ede56de940ab099e6e624c6ee6419fead426b4428662cc5c0dec9f0a8ffec0fe8274c7b8fc1c8065f756cf0ab216142b72937be93b353f082833e8c437425c6d69b38fdcde399c9ce8350a42ea0980e7ea1f7dec9e19108431387d49f3ed7c2495e497c075fc7eb5f98959792cc3a38a0a43cf58d843d660c2b0be4dd51e018b3e0dfeb9fc9aaa154236900fb667f7470acf85a6ad2d28e546899129f93da2d20"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:04:48 executing program 0: getpid() perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:48 executing program 0: getpid() mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:48 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='veth0_to_batadv\x00', 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) 07:04:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:48 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:48 executing program 5: inotify_init() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) sendfile(r1, r0, 0x0, 0x4) 07:04:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:48 executing program 4: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x0, 0x0, 0x2, 0x9}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 07:04:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x24}}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x39, &(0x7f0000000000)={@remote}, 0x20) tkill(r1, 0x5) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}) wait4(0x0, 0x0, 0x0, 0x0) 07:04:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:51 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000140)={0x81, 0x0, [0xfffffffeffffffff]}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:04:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil}) 07:04:51 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r3 = dup2(r2, 0xffffffffffffffff) write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, 0x0, 0x0, 0xc6ff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:04:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:51 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0xc, 0x0, &(0x7f0000000080)) 07:04:51 executing program 2: 07:04:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r3 = dup2(r2, 0xffffffffffffffff) write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:51 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:51 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000001640)=[{0x0}, {&(0x7f0000000000)=""/61, 0x3d}], 0x2}}], 0x1, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000c80), 0x4924924924924bd, 0x0) 07:04:51 executing program 5: 07:04:51 executing program 5: 07:04:51 executing program 2: 07:04:51 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r3 = dup2(r2, 0xffffffffffffffff) write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:51 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:51 executing program 2: 07:04:52 executing program 4: 07:04:52 executing program 5: 07:04:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:52 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:52 executing program 2: 07:04:52 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:52 executing program 5: 07:04:52 executing program 4: 07:04:52 executing program 2: 07:04:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:52 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], 0x0, &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:52 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:52 executing program 4: 07:04:52 executing program 5: 07:04:52 executing program 2: 07:04:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:52 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], 0x0, &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:52 executing program 4: 07:04:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r3 = dup2(0xffffffffffffffff, r2) write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:52 executing program 2: 07:04:52 executing program 5: 07:04:52 executing program 4: 07:04:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:52 executing program 2: 07:04:52 executing program 5: 07:04:52 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], 0x0, &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r3 = dup2(0xffffffffffffffff, r2) write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:52 executing program 4: 07:04:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:52 executing program 5: 07:04:52 executing program 2: 07:04:52 executing program 4: 07:04:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r3 = dup2(0xffffffffffffffff, r2) write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:52 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)) 07:04:52 executing program 5: 07:04:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:52 executing program 2: 07:04:52 executing program 4: 07:04:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r3 = dup2(r1, r2) write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:53 executing program 5: 07:04:53 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)) 07:04:53 executing program 4: 07:04:53 executing program 2: 07:04:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:53 executing program 2: 07:04:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r3 = dup2(r1, r2) write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:53 executing program 4: 07:04:53 executing program 5: 07:04:53 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)) 07:04:53 executing program 2: 07:04:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r3 = dup2(r1, r2) write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:53 executing program 4: 07:04:53 executing program 5: 07:04:53 executing program 2: 07:04:53 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:04:53 executing program 4: 07:04:53 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r2 = dup2(r0, r1) write$FUSE_IOCTL(r2, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:53 executing program 5: 07:04:53 executing program 2: 07:04:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:53 executing program 4: 07:04:53 executing program 5: 07:04:53 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r2 = dup2(r0, r1) write$FUSE_IOCTL(r2, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:53 executing program 2: 07:04:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:53 executing program 5: 07:04:53 executing program 4: 07:04:53 executing program 2: 07:04:53 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r2 = dup2(r0, r1) write$FUSE_IOCTL(r2, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:53 executing program 5: 07:04:53 executing program 4: 07:04:53 executing program 2: 07:04:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:54 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r3 = dup2(r1, r2) write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:54 executing program 5: 07:04:54 executing program 4: 07:04:54 executing program 2: 07:04:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:54 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r3 = dup2(r1, r2) write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:54 executing program 4: 07:04:54 executing program 5: 07:04:54 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) 07:04:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002008100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x34) wait4(0x0, 0x0, 0x0, 0x0) 07:04:54 executing program 5: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x208200) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x0) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 07:04:54 executing program 0: [ 184.603145][ T28] audit: type=1326 audit(1592636694.348:2): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=8665 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f89a code=0x0 07:04:54 executing program 0: 07:04:54 executing program 5: 07:04:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:54 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r3 = dup2(r1, r2) write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:54 executing program 5: 07:04:54 executing program 0: 07:04:54 executing program 5: 07:04:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:55 executing program 2: 07:04:57 executing program 4: 07:04:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:57 executing program 0: 07:04:57 executing program 5: 07:04:57 executing program 2: 07:04:57 executing program 5: 07:04:57 executing program 2: 07:04:57 executing program 0: 07:04:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:57 executing program 5: 07:04:57 executing program 4: 07:04:57 executing program 0: 07:04:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:57 executing program 2: 07:04:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/igmp\x00') sendfile(r2, r3, 0x0, 0x800000080004105) 07:04:57 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400)) 07:04:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:04:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:04:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:57 executing program 0: getpid() perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26) read$midi(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:04:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:04:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r3 = dup2(r1, r2) write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:59 executing program 4: getpid() perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26) read$midi(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) 07:04:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:04:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:04:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:04:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:04:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r3 = dup2(r1, r2) write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r3 = dup2(r1, r2) write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:04:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:04:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) socket(0x0, 0x0, 0x0) 07:04:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:04:59 executing program 4 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:04:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) [ 189.741674][ T8796] FAULT_INJECTION: forcing a failure. [ 189.741674][ T8796] name failslab, interval 1, probability 0, space 0, times 1 07:04:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:04:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) [ 189.824221][ T8796] CPU: 1 PID: 8796 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 189.832497][ T8796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.842550][ T8796] Call Trace: [ 189.845838][ T8796] dump_stack+0x188/0x20d [ 189.850187][ T8796] should_fail.cold+0x5/0xa [ 189.854682][ T8796] ? lock_downgrade+0x840/0x840 [ 189.859525][ T8796] ? fault_create_debugfs_attr+0x140/0x140 [ 189.865317][ T8796] should_failslab+0x5/0xf [ 189.869715][ T8796] __kmalloc_track_caller+0x2d1/0x7a0 [ 189.875070][ T8796] ? strndup_user+0x70/0xe0 [ 189.879553][ T8796] ? vfs_write+0x161/0x5d0 [ 189.883957][ T8796] ? fput_many+0x2f/0x1a0 [ 189.888273][ T8796] memdup_user+0x22/0xd0 [ 189.892506][ T8796] strndup_user+0x70/0xe0 [ 189.896825][ T8796] __x64_sys_mount+0xe6/0x230 [ 189.901494][ T8796] do_syscall_64+0xf6/0x7d0 [ 189.905985][ T8796] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 189.911852][ T8796] RIP: 0033:0x45ca59 [ 189.915728][ T8796] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.935311][ T8796] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 189.943699][ T8796] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 189.951649][ T8796] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 189.959598][ T8796] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 07:04:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:04:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:04:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) socket(0x0, 0x0, 0x0) [ 189.967546][ T8796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 189.975494][ T8796] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 07:04:59 executing program 4 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) [ 190.222673][ T8812] FAULT_INJECTION: forcing a failure. [ 190.222673][ T8812] name failslab, interval 1, probability 0, space 0, times 0 07:05:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) [ 190.294750][ T8812] CPU: 0 PID: 8812 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 190.303036][ T8812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.313094][ T8812] Call Trace: [ 190.316396][ T8812] dump_stack+0x188/0x20d [ 190.320739][ T8812] should_fail.cold+0x5/0xa [ 190.325244][ T8812] ? lock_downgrade+0x840/0x840 [ 190.330102][ T8812] ? fault_create_debugfs_attr+0x140/0x140 [ 190.335921][ T8812] should_failslab+0x5/0xf [ 190.340347][ T8812] __kmalloc_track_caller+0x2d1/0x7a0 [ 190.345727][ T8812] ? strndup_user+0x70/0xe0 [ 190.350238][ T8812] ? __might_fault+0x190/0x1d0 [ 190.355014][ T8812] ? _copy_from_user+0x13c/0x1a0 [ 190.359968][ T8812] memdup_user+0x22/0xd0 [ 190.364219][ T8812] strndup_user+0x70/0xe0 [ 190.368557][ T8812] __x64_sys_mount+0x12f/0x230 [ 190.373330][ T8812] do_syscall_64+0xf6/0x7d0 [ 190.377842][ T8812] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 190.383731][ T8812] RIP: 0033:0x45ca59 [ 190.387625][ T8812] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.407232][ T8812] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 190.415650][ T8812] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 190.423631][ T8812] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 190.431783][ T8812] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 07:05:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) [ 190.439774][ T8812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 190.447859][ T8812] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 07:05:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) socket(0x0, 0x0, 0x0) 07:05:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:00 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:00 executing program 4 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) 07:05:00 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffff9c, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:00 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:00 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) [ 191.010176][ T8862] FAULT_INJECTION: forcing a failure. [ 191.010176][ T8862] name failslab, interval 1, probability 0, space 0, times 0 [ 191.075054][ T8862] CPU: 1 PID: 8862 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 191.083331][ T8862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.093403][ T8862] Call Trace: [ 191.096706][ T8862] dump_stack+0x188/0x20d [ 191.101053][ T8862] should_fail.cold+0x5/0xa [ 191.105565][ T8862] ? lock_downgrade+0x840/0x840 [ 191.110421][ T8862] ? fault_create_debugfs_attr+0x140/0x140 [ 191.116233][ T8862] ? get_pid_task+0x116/0x200 [ 191.120920][ T8862] should_failslab+0x5/0xf 07:05:00 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) [ 191.125338][ T8862] kmem_cache_alloc+0x29b/0x740 [ 191.130201][ T8862] getname_flags+0xd2/0x5b0 [ 191.134713][ T8862] user_path_at_empty+0x2a/0x50 [ 191.139567][ T8862] do_mount+0x132/0x1b40 [ 191.143817][ T8862] ? copy_mount_string+0x40/0x40 [ 191.148760][ T8862] ? __might_fault+0x190/0x1d0 [ 191.153527][ T8862] ? _copy_from_user+0x13c/0x1a0 [ 191.158469][ T8862] ? memdup_user+0x7c/0xd0 [ 191.162890][ T8862] __x64_sys_mount+0x18f/0x230 [ 191.167661][ T8862] do_syscall_64+0xf6/0x7d0 07:05:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) [ 191.172175][ T8862] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 191.178066][ T8862] RIP: 0033:0x45ca59 [ 191.181969][ T8862] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.201572][ T8862] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 191.209991][ T8862] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 191.217964][ T8862] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 191.225939][ T8862] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 191.233914][ T8862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 191.241886][ T8862] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 07:05:01 executing program 4 (fault-call:1 fault-nth:3): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:01 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 07:05:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 07:05:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) [ 191.712587][ T8898] FAULT_INJECTION: forcing a failure. [ 191.712587][ T8898] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 191.725827][ T8898] CPU: 1 PID: 8898 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 191.734062][ T8898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.744115][ T8898] Call Trace: [ 191.747454][ T8898] dump_stack+0x188/0x20d [ 191.751799][ T8898] should_fail.cold+0x5/0xa [ 191.756314][ T8898] ? fault_create_debugfs_attr+0x140/0x140 [ 191.762128][ T8898] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 191.768109][ T8898] ? mark_lock+0x11f/0xdd0 [ 191.772531][ T8898] ? stack_trace_save+0x8c/0xc0 [ 191.777392][ T8898] __alloc_pages_nodemask+0x17a/0x810 [ 191.782767][ T8898] ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640 [ 191.789530][ T8898] ? find_held_lock+0x2d/0x110 [ 191.794305][ T8898] ? lock_downgrade+0x840/0x840 [ 191.799165][ T8898] cache_grow_begin+0x8c/0xc10 [ 191.803935][ T8898] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 191.809397][ T8898] kmem_cache_alloc+0x670/0x740 [ 191.814258][ T8898] getname_flags+0xd2/0x5b0 [ 191.818772][ T8898] user_path_at_empty+0x2a/0x50 [ 191.823630][ T8898] do_mount+0x132/0x1b40 [ 191.827885][ T8898] ? copy_mount_string+0x40/0x40 [ 191.832832][ T8898] ? __might_fault+0x190/0x1d0 [ 191.837601][ T8898] ? _copy_from_user+0x13c/0x1a0 [ 191.842556][ T8898] ? memdup_user+0x7c/0xd0 [ 191.846979][ T8898] __x64_sys_mount+0x18f/0x230 [ 191.851747][ T8898] do_syscall_64+0xf6/0x7d0 [ 191.856258][ T8898] entry_SYSCALL_64_after_hwframe+0x49/0xb3 07:05:01 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) [ 191.862153][ T8898] RIP: 0033:0x45ca59 [ 191.866049][ T8898] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.885652][ T8898] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 191.894074][ T8898] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 191.902135][ T8898] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 191.910111][ T8898] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 191.918086][ T8898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 191.926060][ T8898] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 07:05:01 executing program 4 (fault-call:1 fault-nth:4): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:01 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 07:05:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 07:05:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 07:05:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:02 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 192.231882][ T8926] FAULT_INJECTION: forcing a failure. [ 192.231882][ T8926] name failslab, interval 1, probability 0, space 0, times 0 [ 192.310741][ T8926] CPU: 0 PID: 8926 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 192.319030][ T8926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.329087][ T8926] Call Trace: [ 192.332391][ T8926] dump_stack+0x188/0x20d [ 192.336737][ T8926] should_fail.cold+0x5/0xa [ 192.341288][ T8926] ? fault_create_debugfs_attr+0x140/0x140 [ 192.347110][ T8926] should_failslab+0x5/0xf [ 192.351530][ T8926] __kmalloc+0x2d9/0x7a0 [ 192.355790][ T8926] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 192.361777][ T8926] ? tomoyo_encode2.part.0+0xec/0x3b0 [ 192.367151][ T8926] ? mark_lock+0x11f/0xdd0 [ 192.371579][ T8926] tomoyo_encode2.part.0+0xec/0x3b0 [ 192.376805][ T8926] ? do_syscall_64+0xf6/0x7d0 [ 192.381489][ T8926] tomoyo_encode+0x28/0x50 [ 192.385910][ T8926] tomoyo_mount_acl+0xe0/0x840 [ 192.390690][ T8926] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 192.396241][ T8926] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 192.402224][ T8926] ? do_raw_spin_unlock+0x171/0x260 [ 192.407430][ T8926] ? trace_hardirqs_off+0x50/0x220 [ 192.412539][ T8926] ? debug_smp_processor_id+0x2f/0x185 [ 192.418013][ T8926] ? putname+0xe1/0x120 [ 192.422172][ T8926] ? tomoyo_profile+0x42/0x50 [ 192.426852][ T8926] ? tomoyo_get_mode.part.0+0x127/0x160 [ 192.432411][ T8926] tomoyo_mount_permission+0x151/0x3f0 [ 192.437875][ T8926] ? tomoyo_mount_permission+0xfa/0x3f0 [ 192.443425][ T8926] ? tomoyo_mount_acl+0x840/0x840 [ 192.448455][ T8926] ? __phys_addr_symbol+0x2c/0x70 [ 192.453502][ T8926] security_sb_mount+0x82/0xc0 [ 192.458274][ T8926] do_mount+0x1b4/0x1b40 [ 192.462523][ T8926] ? copy_mount_string+0x40/0x40 [ 192.467458][ T8926] ? __might_fault+0x190/0x1d0 [ 192.472224][ T8926] ? _copy_from_user+0x13c/0x1a0 [ 192.477344][ T8926] ? memdup_user+0x7c/0xd0 [ 192.481800][ T8926] __x64_sys_mount+0x18f/0x230 [ 192.486571][ T8926] do_syscall_64+0xf6/0x7d0 [ 192.491081][ T8926] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 192.496973][ T8926] RIP: 0033:0x45ca59 [ 192.500884][ T8926] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.520489][ T8926] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 192.528904][ T8926] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 192.536877][ T8926] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 192.544847][ T8926] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 192.552821][ T8926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 07:05:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 07:05:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) [ 192.560795][ T8926] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 07:05:02 executing program 4 (fault-call:1 fault-nth:5): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 07:05:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 07:05:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 07:05:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 07:05:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 07:05:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 07:05:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) [ 192.863642][ T8960] FAULT_INJECTION: forcing a failure. [ 192.863642][ T8960] name failslab, interval 1, probability 0, space 0, times 0 07:05:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 192.974053][ T8960] CPU: 0 PID: 8960 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 192.982328][ T8960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.992390][ T8960] Call Trace: [ 192.995704][ T8960] dump_stack+0x188/0x20d [ 193.000060][ T8960] should_fail.cold+0x5/0xa [ 193.004590][ T8960] ? fault_create_debugfs_attr+0x140/0x140 [ 193.010412][ T8960] should_failslab+0x5/0xf [ 193.014832][ T8960] __kmalloc+0x2d9/0x7a0 [ 193.019080][ T8960] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 193.025059][ T8960] ? tomoyo_realpath_from_path+0xc2/0x620 [ 193.030782][ T8960] ? tomoyo_encode2.part.0+0xec/0x3b0 [ 193.036158][ T8960] ? mark_lock+0x11f/0xdd0 [ 193.040583][ T8960] tomoyo_realpath_from_path+0xc2/0x620 [ 193.046138][ T8960] ? tomoyo_fill_path_info+0x22e/0x420 [ 193.051604][ T8960] tomoyo_mount_acl+0x149/0x840 [ 193.056472][ T8960] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 193.062025][ T8960] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 193.068012][ T8960] ? trace_hardirqs_off+0x50/0x220 [ 193.073129][ T8960] ? debug_smp_processor_id+0x2f/0x185 [ 193.078612][ T8960] ? putname+0xe1/0x120 [ 193.082776][ T8960] ? tomoyo_profile+0x42/0x50 [ 193.087455][ T8960] ? tomoyo_get_mode.part.0+0x127/0x160 [ 193.093011][ T8960] tomoyo_mount_permission+0x151/0x3f0 [ 193.098475][ T8960] ? tomoyo_mount_permission+0xfa/0x3f0 [ 193.104025][ T8960] ? tomoyo_mount_acl+0x840/0x840 [ 193.109053][ T8960] ? __phys_addr_symbol+0x2c/0x70 [ 193.114103][ T8960] security_sb_mount+0x82/0xc0 [ 193.118876][ T8960] do_mount+0x1b4/0x1b40 [ 193.123137][ T8960] ? copy_mount_string+0x40/0x40 [ 193.128084][ T8960] ? __might_fault+0x190/0x1d0 [ 193.132862][ T8960] ? _copy_from_user+0x13c/0x1a0 [ 193.137817][ T8960] ? memdup_user+0x7c/0xd0 [ 193.142247][ T8960] __x64_sys_mount+0x18f/0x230 [ 193.147027][ T8960] do_syscall_64+0xf6/0x7d0 [ 193.151538][ T8960] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 193.157428][ T8960] RIP: 0033:0x45ca59 [ 193.161323][ T8960] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.180932][ T8960] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 193.189350][ T8960] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 193.197323][ T8960] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 193.205297][ T8960] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 193.213270][ T8960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 193.221244][ T8960] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 07:05:03 executing program 4 (fault-call:1 fault-nth:6): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 07:05:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 07:05:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 193.275829][ T8960] ERROR: Out of memory at tomoyo_realpath_from_path. 07:05:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 07:05:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 07:05:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 193.445649][ T8989] FAULT_INJECTION: forcing a failure. [ 193.445649][ T8989] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 193.458901][ T8989] CPU: 1 PID: 8989 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 193.467145][ T8989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.477207][ T8989] Call Trace: [ 193.480508][ T8989] dump_stack+0x188/0x20d [ 193.484852][ T8989] should_fail.cold+0x5/0xa [ 193.489365][ T8989] ? __x64_sys_mount+0x18f/0x230 07:05:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) [ 193.494314][ T8989] ? fault_create_debugfs_attr+0x140/0x140 [ 193.500128][ T8989] ? lock_downgrade+0x840/0x840 [ 193.504986][ T8989] ? unwind_next_frame+0x105a/0x1df0 [ 193.510279][ T8989] __alloc_pages_nodemask+0x17a/0x810 [ 193.515668][ T8989] ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640 [ 193.522454][ T8989] cache_grow_begin+0x8c/0xc10 [ 193.527223][ T8989] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 193.532691][ T8989] __kmalloc+0x6dc/0x7a0 [ 193.536940][ T8989] ? tomoyo_realpath_from_path+0xc2/0x620 [ 193.542665][ T8989] ? mark_lock+0x11f/0xdd0 [ 193.547090][ T8989] tomoyo_realpath_from_path+0xc2/0x620 [ 193.552641][ T8989] ? tomoyo_fill_path_info+0x22e/0x420 [ 193.558113][ T8989] tomoyo_mount_acl+0x149/0x840 [ 193.562980][ T8989] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 193.568536][ T8989] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 193.574526][ T8989] ? trace_hardirqs_off+0x50/0x220 [ 193.579647][ T8989] ? debug_smp_processor_id+0x2f/0x185 [ 193.585124][ T8989] ? putname+0xe1/0x120 [ 193.589284][ T8989] ? tomoyo_profile+0x42/0x50 [ 193.593968][ T8989] ? tomoyo_get_mode.part.0+0x127/0x160 [ 193.599527][ T8989] tomoyo_mount_permission+0x151/0x3f0 [ 193.604988][ T8989] ? tomoyo_mount_permission+0xfa/0x3f0 [ 193.610540][ T8989] ? tomoyo_mount_acl+0x840/0x840 [ 193.615569][ T8989] ? __phys_addr_symbol+0x2c/0x70 [ 193.620619][ T8989] security_sb_mount+0x82/0xc0 [ 193.625389][ T8989] do_mount+0x1b4/0x1b40 [ 193.629645][ T8989] ? copy_mount_string+0x40/0x40 [ 193.634590][ T8989] ? __might_fault+0x190/0x1d0 [ 193.639360][ T8989] ? _copy_from_user+0x13c/0x1a0 07:05:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) [ 193.644306][ T8989] ? memdup_user+0x7c/0xd0 [ 193.648735][ T8989] __x64_sys_mount+0x18f/0x230 [ 193.653505][ T8989] do_syscall_64+0xf6/0x7d0 [ 193.658015][ T8989] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 193.663905][ T8989] RIP: 0033:0x45ca59 [ 193.667802][ T8989] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.687407][ T8989] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 193.695827][ T8989] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 193.703810][ T8989] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 193.711785][ T8989] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 193.719761][ T8989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 193.727825][ T8989] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 07:05:03 executing program 4 (fault-call:1 fault-nth:7): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 07:05:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) 07:05:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 194.026510][ T9023] FAULT_INJECTION: forcing a failure. [ 194.026510][ T9023] name failslab, interval 1, probability 0, space 0, times 0 07:05:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) [ 194.137296][ T9023] CPU: 1 PID: 9023 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 194.145573][ T9023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.155631][ T9023] Call Trace: [ 194.158942][ T9023] dump_stack+0x188/0x20d [ 194.163286][ T9023] should_fail.cold+0x5/0xa [ 194.167801][ T9023] ? fault_create_debugfs_attr+0x140/0x140 [ 194.173614][ T9023] ? get_fs_root_and_pwd_rcu.isra.0+0x3a0/0x3a0 [ 194.179867][ T9023] should_failslab+0x5/0xf [ 194.184284][ T9023] __kmalloc+0x2d9/0x7a0 [ 194.188535][ T9023] ? tomoyo_encode2.part.0+0xec/0x3b0 [ 194.193911][ T9023] ? d_absolute_path+0x10c/0x160 [ 194.198853][ T9023] ? __d_path+0x140/0x140 [ 194.203272][ T9023] tomoyo_encode2.part.0+0xec/0x3b0 [ 194.208477][ T9023] tomoyo_encode+0x28/0x50 [ 194.212893][ T9023] tomoyo_realpath_from_path+0x184/0x620 [ 194.218535][ T9023] tomoyo_mount_acl+0x149/0x840 [ 194.223386][ T9023] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 194.228926][ T9023] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 194.231479][ T0] NOHZ: local_softirq_pending 08 [ 194.234904][ T9023] ? trace_hardirqs_off+0x50/0x220 [ 194.244949][ T9023] ? debug_smp_processor_id+0x2f/0x185 [ 194.250427][ T9023] ? putname+0xe1/0x120 [ 194.254591][ T9023] ? tomoyo_profile+0x42/0x50 [ 194.259255][ T9023] ? tomoyo_get_mode.part.0+0x127/0x160 [ 194.264785][ T9023] tomoyo_mount_permission+0x151/0x3f0 [ 194.270233][ T9023] ? tomoyo_mount_permission+0xfa/0x3f0 [ 194.275783][ T9023] ? tomoyo_mount_acl+0x840/0x840 [ 194.280807][ T9023] ? __phys_addr_symbol+0x2c/0x70 [ 194.285856][ T9023] security_sb_mount+0x82/0xc0 [ 194.290759][ T9023] do_mount+0x1b4/0x1b40 [ 194.295011][ T9023] ? copy_mount_string+0x40/0x40 [ 194.299954][ T9023] ? __might_fault+0x190/0x1d0 [ 194.304721][ T9023] ? _copy_from_user+0x13c/0x1a0 [ 194.309668][ T9023] ? memdup_user+0x7c/0xd0 [ 194.314088][ T9023] __x64_sys_mount+0x18f/0x230 [ 194.318857][ T9023] do_syscall_64+0xf6/0x7d0 [ 194.323366][ T9023] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 194.329258][ T9023] RIP: 0033:0x45ca59 [ 194.333152][ T9023] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 194.352754][ T9023] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 194.361168][ T9023] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 194.369147][ T9023] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 194.377146][ T9023] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 194.385122][ T9023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 194.393098][ T9023] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 [ 194.408459][ T9023] ERROR: Out of memory at tomoyo_realpath_from_path. 07:05:04 executing program 4 (fault-call:1 fault-nth:8): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 07:05:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) 07:05:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) 07:05:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) 07:05:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 07:05:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) [ 194.582714][ T9050] FAULT_INJECTION: forcing a failure. [ 194.582714][ T9050] name failslab, interval 1, probability 0, space 0, times 0 07:05:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) [ 194.685149][ T9050] CPU: 1 PID: 9050 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 194.693465][ T9050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.703528][ T9050] Call Trace: [ 194.706845][ T9050] dump_stack+0x188/0x20d [ 194.711199][ T9050] should_fail.cold+0x5/0xa [ 194.715717][ T9050] ? fault_create_debugfs_attr+0x140/0x140 [ 194.721530][ T9050] ? find_held_lock+0x2d/0x110 [ 194.726305][ T9050] should_failslab+0x5/0xf [ 194.730723][ T9050] __kmalloc+0x2d9/0x7a0 [ 194.734970][ T9050] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 194.740949][ T9050] ? tomoyo_encode2.part.0+0x2f4/0x3b0 [ 194.746456][ T9050] tomoyo_encode2.part.0+0x2f4/0x3b0 [ 194.751761][ T9050] tomoyo_encode+0x28/0x50 [ 194.756195][ T9050] tomoyo_mount_acl+0x320/0x840 [ 194.761061][ T9050] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 194.766614][ T9050] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 194.772605][ T9050] ? trace_hardirqs_off+0x50/0x220 [ 194.777718][ T9050] ? debug_smp_processor_id+0x2f/0x185 [ 194.783198][ T9050] ? putname+0xe1/0x120 [ 194.787358][ T9050] ? tomoyo_profile+0x42/0x50 [ 194.792039][ T9050] ? tomoyo_get_mode.part.0+0x127/0x160 [ 194.797592][ T9050] tomoyo_mount_permission+0x151/0x3f0 [ 194.803057][ T9050] ? tomoyo_mount_permission+0xfa/0x3f0 [ 194.808613][ T9050] ? tomoyo_mount_acl+0x840/0x840 [ 194.813641][ T9050] ? __phys_addr_symbol+0x2c/0x70 [ 194.818690][ T9050] security_sb_mount+0x82/0xc0 [ 194.823463][ T9050] do_mount+0x1b4/0x1b40 [ 194.827713][ T9050] ? copy_mount_string+0x40/0x40 [ 194.832656][ T9050] ? __might_fault+0x190/0x1d0 [ 194.837423][ T9050] ? _copy_from_user+0x13c/0x1a0 [ 194.842371][ T9050] ? memdup_user+0x7c/0xd0 [ 194.846800][ T9050] __x64_sys_mount+0x18f/0x230 [ 194.851569][ T9050] do_syscall_64+0xf6/0x7d0 [ 194.856090][ T9050] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 194.861977][ T9050] RIP: 0033:0x45ca59 [ 194.865871][ T9050] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 194.885470][ T9050] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 194.893881][ T9050] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 194.901838][ T9050] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 194.909804][ T9050] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 194.917775][ T9050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 194.925755][ T9050] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 07:05:04 executing program 4 (fault-call:1 fault-nth:9): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0) 07:05:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 07:05:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) 07:05:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0) [ 195.137052][ T9079] FAULT_INJECTION: forcing a failure. [ 195.137052][ T9079] name failslab, interval 1, probability 0, space 0, times 0 07:05:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0) 07:05:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0) socket(0x0, 0x0, 0x0) [ 195.179887][ T9079] CPU: 1 PID: 9079 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 195.188162][ T9079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.198219][ T9079] Call Trace: [ 195.201519][ T9079] dump_stack+0x188/0x20d [ 195.205865][ T9079] should_fail.cold+0x5/0xa [ 195.210429][ T9079] ? fault_create_debugfs_attr+0x140/0x140 [ 195.216244][ T9079] should_failslab+0x5/0xf [ 195.220669][ T9079] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 195.226051][ T9079] ? put_dec+0xd0/0xd0 [ 195.230124][ T9079] ? format_decode+0x230/0xad0 [ 195.234897][ T9079] tomoyo_init_log+0x18a/0x1e50 [ 195.239755][ T9079] ? security_sb_mount+0x82/0xc0 [ 195.244705][ T9079] ? __x64_sys_mount+0x18f/0x230 [ 195.249647][ T9079] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 195.255554][ T9079] ? common_lsm_audit+0x1ce0/0x1ce0 [ 195.260753][ T9079] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 195.266645][ T9079] ? tomoyo_profile+0x42/0x50 [ 195.271327][ T9079] ? tomoyo_domain_quota_is_ok+0x2d5/0x500 07:05:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) [ 195.277143][ T9079] tomoyo_supervisor+0x32c/0xf00 [ 195.282089][ T9079] ? tomoyo_profile+0x50/0x50 [ 195.286775][ T9079] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 195.292327][ T9079] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 195.298314][ T9079] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 195.304142][ T9079] ? tomoyo_check_mount_acl+0x5a/0x1a0 [ 195.309613][ T9079] ? tomoyo_check_acl+0x2e5/0x3e0 [ 195.314652][ T9079] tomoyo_mount_acl+0x51d/0x840 [ 195.319520][ T9079] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 195.325070][ T9079] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 195.331064][ T9079] ? debug_smp_processor_id+0x2f/0x185 [ 195.336576][ T9079] ? putname+0xe1/0x120 [ 195.340739][ T9079] ? tomoyo_profile+0x42/0x50 [ 195.345422][ T9079] ? tomoyo_get_mode.part.0+0x127/0x160 [ 195.350972][ T9079] tomoyo_mount_permission+0x151/0x3f0 [ 195.356432][ T9079] ? tomoyo_mount_permission+0xfa/0x3f0 [ 195.361989][ T9079] ? tomoyo_mount_acl+0x840/0x840 [ 195.367030][ T9079] ? __phys_addr_symbol+0x2c/0x70 [ 195.372080][ T9079] security_sb_mount+0x82/0xc0 [ 195.376851][ T9079] do_mount+0x1b4/0x1b40 [ 195.381098][ T9079] ? copy_mount_string+0x40/0x40 [ 195.386042][ T9079] ? __might_fault+0x190/0x1d0 [ 195.390807][ T9079] ? _copy_from_user+0x13c/0x1a0 [ 195.395751][ T9079] ? memdup_user+0x7c/0xd0 [ 195.400181][ T9079] __x64_sys_mount+0x18f/0x230 [ 195.404950][ T9079] do_syscall_64+0xf6/0x7d0 [ 195.409455][ T9079] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 195.415343][ T9079] RIP: 0033:0x45ca59 [ 195.419237][ T9079] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 195.438845][ T9079] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 195.447270][ T9079] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 195.455246][ T9079] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 195.463219][ T9079] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 195.471196][ T9079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 195.479175][ T9079] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 07:05:05 executing program 4 (fault-call:1 fault-nth:10): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, 0x0, 0x0) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0) 07:05:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0) 07:05:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, 0x0, 0x0) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0) 07:05:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, 0x0, 0x0) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0) [ 195.724813][ T9106] FAULT_INJECTION: forcing a failure. [ 195.724813][ T9106] name failslab, interval 1, probability 0, space 0, times 0 07:05:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) [ 195.812803][ T9106] CPU: 1 PID: 9106 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 195.821080][ T9106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.831162][ T9106] Call Trace: [ 195.834445][ T9106] dump_stack+0x188/0x20d [ 195.838767][ T9106] should_fail.cold+0x5/0xa [ 195.843267][ T9106] ? lock_downgrade+0x840/0x840 [ 195.848112][ T9106] ? fault_create_debugfs_attr+0x140/0x140 [ 195.853913][ T9106] should_failslab+0x5/0xf [ 195.858320][ T9106] __kmalloc_track_caller+0x2d1/0x7a0 [ 195.863669][ T9106] ? vfs_parse_fs_string+0xc0/0x150 [ 195.868846][ T9106] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 195.874646][ T9106] kmemdup_nul+0x2d/0xa0 [ 195.878876][ T9106] vfs_parse_fs_string+0xc0/0x150 [ 195.883879][ T9106] ? vfs_parse_fs_param+0x570/0x570 [ 195.889064][ T9106] ? task_active_pid_ns+0xa1/0xe0 [ 195.894072][ T9106] ? alloc_fs_context+0x56c/0x880 [ 195.899091][ T9106] do_mount+0x111d/0x1b40 [ 195.903403][ T9106] ? copy_mount_string+0x40/0x40 [ 195.908320][ T9106] ? __might_fault+0x190/0x1d0 [ 195.913063][ T9106] ? _copy_from_user+0x13c/0x1a0 [ 195.917985][ T9106] ? memdup_user+0x7c/0xd0 [ 195.922381][ T9106] __x64_sys_mount+0x18f/0x230 [ 195.927125][ T9106] do_syscall_64+0xf6/0x7d0 [ 195.931608][ T9106] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 195.937493][ T9106] RIP: 0033:0x45ca59 [ 195.941377][ T9106] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:05:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0) socket(0x0, 0x0, 0x0) [ 195.960967][ T9106] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 195.969356][ T9106] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 195.977317][ T9106] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 195.985269][ T9106] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 195.993226][ T9106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 196.001175][ T9106] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 07:05:05 executing program 4 (fault-call:1 fault-nth:11): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0) 07:05:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x0, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0) 07:05:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) 07:05:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0) 07:05:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0) 07:05:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) 07:05:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x0, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) [ 196.364109][ T9136] FAULT_INJECTION: forcing a failure. [ 196.364109][ T9136] name failslab, interval 1, probability 0, space 0, times 0 [ 196.409666][ T9136] CPU: 1 PID: 9136 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 196.417939][ T9136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.428013][ T9136] Call Trace: [ 196.431328][ T9136] dump_stack+0x188/0x20d [ 196.435688][ T9136] should_fail.cold+0x5/0xa [ 196.440206][ T9136] ? fault_create_debugfs_attr+0x140/0x140 [ 196.446033][ T9136] should_failslab+0x5/0xf [ 196.450456][ T9136] __kmalloc+0x2d9/0x7a0 [ 196.454714][ T9136] ? prealloc_shrinker+0x9d/0x340 [ 196.459757][ T9136] ? lockdep_init_map_waits+0x26a/0x890 [ 196.465322][ T9136] prealloc_shrinker+0x9d/0x340 [ 196.470187][ T9136] alloc_super+0x819/0x9d0 [ 196.474620][ T9136] sget_fc+0x13f/0x790 [ 196.478701][ T9136] ? compare_single+0x10/0x10 [ 196.483387][ T9136] ? proc_parse_param+0x8a0/0x8a0 [ 196.488418][ T9136] vfs_get_super+0x6d/0x2d0 [ 196.492931][ T9136] vfs_get_tree+0x89/0x2f0 [ 196.497356][ T9136] do_mount+0x1306/0x1b40 [ 196.501697][ T9136] ? copy_mount_string+0x40/0x40 07:05:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) socket(0x0, 0x0, 0x0) [ 196.506639][ T9136] ? __might_fault+0x190/0x1d0 [ 196.511410][ T9136] ? _copy_from_user+0x13c/0x1a0 [ 196.516355][ T9136] ? memdup_user+0x7c/0xd0 [ 196.520780][ T9136] __x64_sys_mount+0x18f/0x230 [ 196.525559][ T9136] do_syscall_64+0xf6/0x7d0 [ 196.530072][ T9136] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 196.535963][ T9136] RIP: 0033:0x45ca59 [ 196.539864][ T9136] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 196.559588][ T9136] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 196.568009][ T9136] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 196.575989][ T9136] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 196.583967][ T9136] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 196.591938][ T9136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 196.599917][ T9136] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 07:05:06 executing program 4 (fault-call:1 fault-nth:12): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0) 07:05:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x0, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) 07:05:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(0xffffffffffffffff, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) [ 196.804020][ T9158] FAULT_INJECTION: forcing a failure. [ 196.804020][ T9158] name failslab, interval 1, probability 0, space 0, times 0 [ 196.875226][ T9158] CPU: 0 PID: 9158 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 196.883500][ T9158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.893558][ T9158] Call Trace: [ 196.896856][ T9158] dump_stack+0x188/0x20d [ 196.901204][ T9158] should_fail.cold+0x5/0xa [ 196.905713][ T9158] ? lock_downgrade+0x840/0x840 [ 196.910601][ T9158] ? fault_create_debugfs_attr+0x140/0x140 [ 196.916452][ T9158] should_failslab+0x5/0xf 07:05:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(0xffffffffffffffff, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) [ 196.920877][ T9158] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 196.926254][ T9158] ? lock_downgrade+0x840/0x840 [ 196.931112][ T9158] ? do_raw_spin_lock+0x129/0x2e0 [ 196.936149][ T9158] alloc_super+0x52/0x9d0 [ 196.940489][ T9158] sget_fc+0x13f/0x790 [ 196.944565][ T9158] ? compare_single+0x10/0x10 [ 196.949251][ T9158] ? proc_parse_param+0x8a0/0x8a0 [ 196.954281][ T9158] vfs_get_super+0x6d/0x2d0 [ 196.958792][ T9158] vfs_get_tree+0x89/0x2f0 [ 196.963207][ T9158] do_mount+0x1306/0x1b40 [ 196.967542][ T9158] ? copy_mount_string+0x40/0x40 07:05:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0) 07:05:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) socket(0x0, 0x0, 0x0) [ 196.972485][ T9158] ? __might_fault+0x190/0x1d0 [ 196.977255][ T9158] ? _copy_from_user+0x13c/0x1a0 [ 196.982205][ T9158] ? memdup_user+0x7c/0xd0 [ 196.986630][ T9158] __x64_sys_mount+0x18f/0x230 [ 196.991404][ T9158] do_syscall_64+0xf6/0x7d0 [ 196.995919][ T9158] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 197.001810][ T9158] RIP: 0033:0x45ca59 [ 197.005701][ T9158] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.025350][ T9158] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 197.033770][ T9158] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 197.041751][ T9158] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 197.049730][ T9158] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 197.057708][ T9158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 197.065692][ T9158] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 07:05:06 executing program 4 (fault-call:1 fault-nth:13): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0) 07:05:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(0xffffffffffffffff, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) [ 197.263069][ T9194] FAULT_INJECTION: forcing a failure. [ 197.263069][ T9194] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 197.276304][ T9194] CPU: 0 PID: 9194 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 197.284543][ T9194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.294605][ T9194] Call Trace: [ 197.297910][ T9194] dump_stack+0x188/0x20d [ 197.302259][ T9194] should_fail.cold+0x5/0xa [ 197.306776][ T9194] ? fault_create_debugfs_attr+0x140/0x140 [ 197.312591][ T9194] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 197.318580][ T9194] ? __lock_acquire+0x2224/0x48a0 [ 197.323615][ T9194] __alloc_pages_nodemask+0x17a/0x810 [ 197.329003][ T9194] ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640 [ 197.335770][ T9194] ? find_held_lock+0x2d/0x110 [ 197.340550][ T9194] ? lock_downgrade+0x840/0x840 [ 197.345412][ T9194] cache_grow_begin+0x8c/0xc10 [ 197.350181][ T9194] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 197.355645][ T9194] kmem_cache_alloc_trace+0x6ed/0x7d0 [ 197.361027][ T9194] ? do_raw_spin_lock+0x129/0x2e0 [ 197.366057][ T9194] alloc_super+0x52/0x9d0 [ 197.370401][ T9194] sget_fc+0x13f/0x790 [ 197.374476][ T9194] ? compare_single+0x10/0x10 [ 197.379161][ T9194] ? proc_parse_param+0x8a0/0x8a0 [ 197.384189][ T9194] vfs_get_super+0x6d/0x2d0 [ 197.388703][ T9194] vfs_get_tree+0x89/0x2f0 [ 197.393125][ T9194] do_mount+0x1306/0x1b40 [ 197.397464][ T9194] ? copy_mount_string+0x40/0x40 [ 197.402403][ T9194] ? __might_fault+0x190/0x1d0 [ 197.407168][ T9194] ? _copy_from_user+0x13c/0x1a0 [ 197.412112][ T9194] ? memdup_user+0x7c/0xd0 [ 197.416535][ T9194] __x64_sys_mount+0x18f/0x230 [ 197.421307][ T9194] do_syscall_64+0xf6/0x7d0 [ 197.425816][ T9194] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 197.431708][ T9194] RIP: 0033:0x45ca59 [ 197.435603][ T9194] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.455210][ T9194] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 197.463744][ T9194] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 197.471738][ T9194] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 197.479803][ T9194] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 197.487779][ T9194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 197.495756][ T9194] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 07:05:07 executing program 4 (fault-call:1 fault-nth:14): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) 07:05:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) 07:05:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r3 = dup2(r2, 0xffffffffffffffff) write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0) 07:05:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) [ 197.651668][ T9206] FAULT_INJECTION: forcing a failure. [ 197.651668][ T9206] name failslab, interval 1, probability 0, space 0, times 0 [ 197.706566][ T9206] CPU: 0 PID: 9206 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 197.714829][ T9206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.724888][ T9206] Call Trace: [ 197.728190][ T9206] dump_stack+0x188/0x20d [ 197.732535][ T9206] should_fail.cold+0x5/0xa [ 197.737049][ T9206] ? fault_create_debugfs_attr+0x140/0x140 [ 197.742878][ T9206] should_failslab+0x5/0xf [ 197.747301][ T9206] __kmalloc+0x2d9/0x7a0 [ 197.751549][ T9206] ? prealloc_shrinker+0x9d/0x340 07:05:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0) 07:05:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) 07:05:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) [ 197.756579][ T9206] ? lockdep_init_map_waits+0x26a/0x890 [ 197.762134][ T9206] prealloc_shrinker+0x9d/0x340 [ 197.766993][ T9206] alloc_super+0x819/0x9d0 [ 197.771417][ T9206] sget_fc+0x13f/0x790 [ 197.775501][ T9206] ? compare_single+0x10/0x10 [ 197.780183][ T9206] ? proc_parse_param+0x8a0/0x8a0 [ 197.785212][ T9206] vfs_get_super+0x6d/0x2d0 [ 197.789724][ T9206] vfs_get_tree+0x89/0x2f0 [ 197.794147][ T9206] do_mount+0x1306/0x1b40 [ 197.798490][ T9206] ? copy_mount_string+0x40/0x40 07:05:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) [ 197.803435][ T9206] ? __might_fault+0x190/0x1d0 [ 197.808203][ T9206] ? _copy_from_user+0x13c/0x1a0 [ 197.813157][ T9206] ? memdup_user+0x7c/0xd0 [ 197.817582][ T9206] __x64_sys_mount+0x18f/0x230 [ 197.822350][ T9206] do_syscall_64+0xf6/0x7d0 [ 197.826863][ T9206] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 197.832752][ T9206] RIP: 0033:0x45ca59 [ 197.836644][ T9206] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:05:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0) [ 197.856251][ T9206] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 197.864669][ T9206] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 197.872735][ T9206] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 197.880818][ T9206] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 197.888798][ T9206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 197.896777][ T9206] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 07:05:07 executing program 4 (fault-call:1 fault-nth:15): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r3 = dup2(r2, 0xffffffffffffffff) write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) 07:05:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0) 07:05:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) socket(0x0, 0x0, 0x0) [ 198.180829][ T9241] FAULT_INJECTION: forcing a failure. [ 198.180829][ T9241] name failslab, interval 1, probability 0, space 0, times 0 [ 198.197544][ T9241] CPU: 1 PID: 9241 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 198.205816][ T9241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.215874][ T9241] Call Trace: [ 198.219168][ T9241] dump_stack+0x188/0x20d [ 198.223507][ T9241] should_fail.cold+0x5/0xa [ 198.228022][ T9241] ? fault_create_debugfs_attr+0x140/0x140 [ 198.233845][ T9241] should_failslab+0x5/0xf [ 198.238270][ T9241] kmem_cache_alloc_node_trace+0x27c/0x790 [ 198.244090][ T9241] ? __kmalloc+0x62f/0x7a0 [ 198.248516][ T9241] __kmalloc_node+0x38/0x60 [ 198.253026][ T9241] kvmalloc_node+0x61/0xf0 [ 198.257451][ T9241] __list_lru_init+0x50e/0x780 [ 198.262223][ T9241] alloc_super+0x86a/0x9d0 [ 198.266651][ T9241] sget_fc+0x13f/0x790 [ 198.270734][ T9241] ? compare_single+0x10/0x10 [ 198.275413][ T9241] ? proc_parse_param+0x8a0/0x8a0 [ 198.280438][ T9241] vfs_get_super+0x6d/0x2d0 [ 198.284952][ T9241] vfs_get_tree+0x89/0x2f0 [ 198.289401][ T9241] do_mount+0x1306/0x1b40 [ 198.293741][ T9241] ? copy_mount_string+0x40/0x40 [ 198.298682][ T9241] ? __might_fault+0x190/0x1d0 [ 198.303467][ T9241] ? _copy_from_user+0x13c/0x1a0 [ 198.308420][ T9241] ? memdup_user+0x7c/0xd0 [ 198.312844][ T9241] __x64_sys_mount+0x18f/0x230 [ 198.317619][ T9241] do_syscall_64+0xf6/0x7d0 [ 198.322132][ T9241] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 198.328025][ T9241] RIP: 0033:0x45ca59 [ 198.331916][ T9241] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 198.351519][ T9241] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 198.359939][ T9241] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 198.367916][ T9241] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 07:05:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r3 = dup2(r2, 0xffffffffffffffff) write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) [ 198.375888][ T9241] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 198.383859][ T9241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 198.391827][ T9241] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 07:05:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:08 executing program 4 (fault-call:1 fault-nth:16): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) dup2(r2, r3) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) dup2(r2, r3) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) socket(0x0, 0x0, 0x0) [ 198.967933][ T9276] FAULT_INJECTION: forcing a failure. [ 198.967933][ T9276] name failslab, interval 1, probability 0, space 0, times 0 07:05:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) [ 199.039541][ T9276] CPU: 0 PID: 9276 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 199.047832][ T9276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.057890][ T9276] Call Trace: [ 199.061195][ T9276] dump_stack+0x188/0x20d [ 199.065542][ T9276] should_fail.cold+0x5/0xa [ 199.070061][ T9276] ? fault_create_debugfs_attr+0x140/0x140 [ 199.075881][ T9276] should_failslab+0x5/0xf [ 199.080743][ T9276] kmem_cache_alloc_node_trace+0x27c/0x790 [ 199.086562][ T9276] ? __kmalloc+0x62f/0x7a0 [ 199.090989][ T9276] __kmalloc_node+0x38/0x60 [ 199.095536][ T9276] kvmalloc_node+0x61/0xf0 [ 199.099957][ T9276] __list_lru_init+0x50e/0x780 [ 199.104737][ T9276] alloc_super+0x86a/0x9d0 [ 199.109164][ T9276] sget_fc+0x13f/0x790 [ 199.113242][ T9276] ? compare_single+0x10/0x10 [ 199.117929][ T9276] ? proc_parse_param+0x8a0/0x8a0 [ 199.122958][ T9276] vfs_get_super+0x6d/0x2d0 [ 199.127471][ T9276] vfs_get_tree+0x89/0x2f0 [ 199.131894][ T9276] do_mount+0x1306/0x1b40 [ 199.136257][ T9276] ? copy_mount_string+0x40/0x40 [ 199.141292][ T9276] ? __might_fault+0x190/0x1d0 [ 199.146065][ T9276] ? _copy_from_user+0x13c/0x1a0 [ 199.151013][ T9276] ? memdup_user+0x7c/0xd0 [ 199.155439][ T9276] __x64_sys_mount+0x18f/0x230 [ 199.160215][ T9276] do_syscall_64+0xf6/0x7d0 [ 199.164729][ T9276] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 199.170623][ T9276] RIP: 0033:0x45ca59 [ 199.174518][ T9276] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.194122][ T9276] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 199.202540][ T9276] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 199.210522][ T9276] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 199.218501][ T9276] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 199.226475][ T9276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 199.234447][ T9276] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 07:05:09 executing program 4 (fault-call:1 fault-nth:17): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) dup2(r2, r3) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) 07:05:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) 07:05:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, 0x0, 0x0) 07:05:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) [ 199.683393][ T9309] FAULT_INJECTION: forcing a failure. [ 199.683393][ T9309] name failslab, interval 1, probability 0, space 0, times 0 [ 199.752692][ T9309] CPU: 1 PID: 9309 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 199.760977][ T9309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.771064][ T9309] Call Trace: [ 199.774369][ T9309] dump_stack+0x188/0x20d [ 199.778724][ T9309] should_fail.cold+0x5/0xa [ 199.783243][ T9309] ? fault_create_debugfs_attr+0x140/0x140 [ 199.789065][ T9309] should_failslab+0x5/0xf [ 199.793485][ T9309] kmem_cache_alloc_node_trace+0x27c/0x790 [ 199.799304][ T9309] __kmalloc_node+0x38/0x60 [ 199.803815][ T9309] kvmalloc_node+0x61/0xf0 [ 199.808240][ T9309] __list_lru_init+0x50e/0x780 [ 199.813016][ T9309] alloc_super+0x86a/0x9d0 [ 199.817446][ T9309] sget_fc+0x13f/0x790 [ 199.821519][ T9309] ? compare_single+0x10/0x10 [ 199.826206][ T9309] ? proc_parse_param+0x8a0/0x8a0 [ 199.831235][ T9309] vfs_get_super+0x6d/0x2d0 [ 199.835742][ T9309] vfs_get_tree+0x89/0x2f0 [ 199.840162][ T9309] do_mount+0x1306/0x1b40 [ 199.844500][ T9309] ? copy_mount_string+0x40/0x40 [ 199.849440][ T9309] ? __might_fault+0x190/0x1d0 [ 199.854239][ T9309] ? _copy_from_user+0x13c/0x1a0 [ 199.859178][ T9309] ? memdup_user+0x7c/0xd0 [ 199.863603][ T9309] __x64_sys_mount+0x18f/0x230 [ 199.868376][ T9309] do_syscall_64+0xf6/0x7d0 [ 199.872896][ T9309] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 199.878783][ T9309] RIP: 0033:0x45ca59 [ 199.882677][ T9309] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:05:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, 0x0, 0x0) [ 199.902289][ T9309] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 199.910740][ T9309] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 199.918724][ T9309] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 199.926706][ T9309] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 199.934689][ T9309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 199.942664][ T9309] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 07:05:09 executing program 4 (fault-call:1 fault-nth:18): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, 0x0, 0x0) 07:05:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x0, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:10 executing program 5 (fault-call:1 fault-nth:0): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:10 executing program 3 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) [ 200.367045][ T9349] FAULT_INJECTION: forcing a failure. [ 200.367045][ T9349] name failslab, interval 1, probability 0, space 0, times 0 07:05:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) [ 200.438379][ T9349] CPU: 0 PID: 9349 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 200.446658][ T9349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.456853][ T9349] Call Trace: [ 200.460161][ T9349] dump_stack+0x188/0x20d [ 200.463093][ T9355] FAULT_INJECTION: forcing a failure. [ 200.463093][ T9355] name failslab, interval 1, probability 0, space 0, times 0 [ 200.464507][ T9349] should_fail.cold+0x5/0xa [ 200.481637][ T9349] ? fault_create_debugfs_attr+0x140/0x140 07:05:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) [ 200.487462][ T9349] should_failslab+0x5/0xf [ 200.491878][ T9349] kmem_cache_alloc_node_trace+0x27c/0x790 [ 200.497698][ T9349] ? __kmalloc+0x62f/0x7a0 [ 200.502123][ T9349] __kmalloc_node+0x38/0x60 [ 200.506640][ T9349] kvmalloc_node+0x61/0xf0 [ 200.511061][ T9349] __list_lru_init+0x50e/0x780 [ 200.515823][ T9349] alloc_super+0x894/0x9d0 [ 200.520254][ T9349] sget_fc+0x13f/0x790 [ 200.524320][ T9349] ? compare_single+0x10/0x10 [ 200.528988][ T9349] ? proc_parse_param+0x8a0/0x8a0 [ 200.534006][ T9349] vfs_get_super+0x6d/0x2d0 [ 200.538522][ T9349] vfs_get_tree+0x89/0x2f0 [ 200.542943][ T9349] do_mount+0x1306/0x1b40 [ 200.547277][ T9349] ? copy_mount_string+0x40/0x40 [ 200.552214][ T9349] ? __might_fault+0x190/0x1d0 [ 200.556979][ T9349] ? _copy_from_user+0x13c/0x1a0 [ 200.561921][ T9349] ? memdup_user+0x7c/0xd0 [ 200.566338][ T9349] __x64_sys_mount+0x18f/0x230 [ 200.571115][ T9349] do_syscall_64+0xf6/0x7d0 [ 200.575624][ T9349] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 200.581517][ T9349] RIP: 0033:0x45ca59 [ 200.585394][ T9349] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 200.604982][ T9349] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 200.613399][ T9349] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 200.621360][ T9349] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 200.629328][ T9349] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 200.637281][ T9349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 200.645237][ T9349] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 [ 200.653326][ T9355] CPU: 1 PID: 9355 Comm: syz-executor.5 Not tainted 5.7.0-syzkaller #0 [ 200.661569][ T9355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.671621][ T9355] Call Trace: [ 200.674916][ T9355] dump_stack+0x188/0x20d [ 200.679248][ T9355] should_fail.cold+0x5/0xa [ 200.683757][ T9355] ? lock_downgrade+0x840/0x840 [ 200.688616][ T9355] ? fault_create_debugfs_attr+0x140/0x140 [ 200.694429][ T9355] ? netlink_insert+0x180/0x1590 [ 200.699391][ T9355] should_failslab+0x5/0xf [ 200.703813][ T9355] kmem_cache_alloc_node+0x25c/0x760 [ 200.709113][ T9355] __alloc_skb+0xba/0x5a0 [ 200.713455][ T9355] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 200.719012][ T9355] ? netlink_autobind.isra.0+0x21b/0x300 [ 200.724761][ T9355] netlink_sendmsg+0x97b/0xe10 [ 200.729536][ T9355] ? aa_af_perm+0x260/0x260 [ 200.734041][ T9355] ? netlink_unicast+0x740/0x740 [ 200.738988][ T9355] ? netlink_unicast+0x740/0x740 [ 200.743932][ T9355] sock_sendmsg+0xcf/0x120 [ 200.748353][ T9355] ____sys_sendmsg+0x6e6/0x810 [ 200.753127][ T9355] ? kernel_sendmsg+0x50/0x50 [ 200.757815][ T9355] ? _parse_integer+0x180/0x180 [ 200.759069][ T9363] FAULT_INJECTION: forcing a failure. [ 200.759069][ T9363] name failslab, interval 1, probability 0, space 0, times 0 [ 200.762671][ T9355] ___sys_sendmsg+0x100/0x170 [ 200.762686][ T9355] ? debug_smp_processor_id+0x2f/0x185 [ 200.762705][ T9355] ? sendmsg_copy_msghdr+0x70/0x70 [ 200.790510][ T9355] ? __fget_files+0x32f/0x500 [ 200.795195][ T9355] ? ksys_dup3+0x3c0/0x3c0 [ 200.799620][ T9355] ? debug_smp_processor_id+0x2f/0x185 [ 200.805082][ T9355] ? __fget_light+0x20e/0x270 [ 200.809767][ T9355] __sys_sendmsg+0xe5/0x1b0 [ 200.814297][ T9355] ? __sys_sendmsg_sock+0xb0/0xb0 [ 200.819317][ T9355] ? vfs_write+0x161/0x5d0 [ 200.823747][ T9355] ? do_syscall_64+0x21/0x7d0 [ 200.828434][ T9355] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 200.834414][ T9355] do_syscall_64+0xf6/0x7d0 [ 200.838909][ T9355] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 200.844784][ T9355] RIP: 0033:0x45ca59 [ 200.848670][ T9355] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 200.868274][ T9355] RSP: 002b:00007f59f2f01c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 200.876691][ T9355] RAX: ffffffffffffffda RBX: 00000000004fe3e0 RCX: 000000000045ca59 [ 200.884672][ T9355] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 200.892645][ T9355] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 200.900615][ T9355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 200.908583][ T9355] R13: 0000000000000945 R14: 00000000004cc0c7 R15: 00007f59f2f026d4 [ 200.916572][ T9363] CPU: 0 PID: 9363 Comm: syz-executor.3 Not tainted 5.7.0-syzkaller #0 [ 200.924851][ T9363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.934906][ T9363] Call Trace: [ 200.938208][ T9363] dump_stack+0x188/0x20d [ 200.942554][ T9363] should_fail.cold+0x5/0xa [ 200.947069][ T9363] ? lock_downgrade+0x840/0x840 [ 200.951930][ T9363] ? fault_create_debugfs_attr+0x140/0x140 [ 200.957740][ T9363] ? netlink_insert+0x180/0x1590 [ 200.962689][ T9363] should_failslab+0x5/0xf [ 200.967112][ T9363] kmem_cache_alloc_node+0x25c/0x760 [ 200.972421][ T9363] __alloc_skb+0xba/0x5a0 [ 200.976758][ T9363] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 200.982308][ T9363] ? netlink_autobind.isra.0+0x21b/0x300 [ 200.987948][ T9363] netlink_sendmsg+0x97b/0xe10 [ 200.992719][ T9363] ? aa_af_perm+0x260/0x260 [ 200.997222][ T9363] ? netlink_unicast+0x740/0x740 [ 201.002171][ T9363] ? netlink_unicast+0x740/0x740 [ 201.007109][ T9363] sock_sendmsg+0xcf/0x120 [ 201.011533][ T9363] ____sys_sendmsg+0x6e6/0x810 [ 201.016302][ T9363] ? kernel_sendmsg+0x50/0x50 [ 201.020982][ T9363] ? _parse_integer+0x180/0x180 [ 201.025848][ T9363] ___sys_sendmsg+0x100/0x170 [ 201.030524][ T9363] ? debug_smp_processor_id+0x2f/0x185 [ 201.035989][ T9363] ? sendmsg_copy_msghdr+0x70/0x70 [ 201.041113][ T9363] ? __fget_files+0x32f/0x500 [ 201.045796][ T9363] ? ksys_dup3+0x3c0/0x3c0 [ 201.050219][ T9363] ? debug_smp_processor_id+0x2f/0x185 [ 201.055690][ T9363] ? __fget_light+0x20e/0x270 [ 201.060375][ T9363] __sys_sendmsg+0xe5/0x1b0 [ 201.064882][ T9363] ? __sys_sendmsg_sock+0xb0/0xb0 [ 201.069907][ T9363] ? vfs_write+0x161/0x5d0 [ 201.074380][ T9363] ? do_syscall_64+0x21/0x7d0 [ 201.079071][ T9363] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 201.085060][ T9363] do_syscall_64+0xf6/0x7d0 [ 201.089573][ T9363] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 201.095474][ T9363] RIP: 0033:0x45ca59 [ 201.099373][ T9363] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 201.118980][ T9363] RSP: 002b:00007f58edd5dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.127399][ T9363] RAX: ffffffffffffffda RBX: 00000000004fe3e0 RCX: 000000000045ca59 07:05:10 executing program 4 (fault-call:1 fault-nth:19): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x0, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) [ 201.135378][ T9363] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 201.139554][ T9375] FAULT_INJECTION: forcing a failure. [ 201.139554][ T9375] name failslab, interval 1, probability 0, space 0, times 0 [ 201.143345][ T9363] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 201.143354][ T9363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 201.143362][ T9363] R13: 0000000000000945 R14: 00000000004cc0c7 R15: 00007f58edd5e6d4 07:05:10 executing program 5 (fault-call:1 fault-nth:1): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x0, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) 07:05:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) [ 201.209665][ T9375] CPU: 1 PID: 9375 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 201.217948][ T9375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.228007][ T9375] Call Trace: [ 201.231310][ T9375] dump_stack+0x188/0x20d [ 201.235654][ T9375] should_fail.cold+0x5/0xa [ 201.240173][ T9375] ? fault_create_debugfs_attr+0x140/0x140 [ 201.245991][ T9375] should_failslab+0x5/0xf [ 201.250405][ T9375] kmem_cache_alloc_node_trace+0x27c/0x790 [ 201.256226][ T9375] __kmalloc_node+0x38/0x60 [ 201.260778][ T9375] kvmalloc_node+0x61/0xf0 [ 201.265199][ T9375] __list_lru_init+0x50e/0x780 [ 201.269973][ T9375] alloc_super+0x894/0x9d0 [ 201.274400][ T9375] sget_fc+0x13f/0x790 [ 201.278476][ T9375] ? compare_single+0x10/0x10 [ 201.283158][ T9375] ? proc_parse_param+0x8a0/0x8a0 [ 201.288189][ T9375] vfs_get_super+0x6d/0x2d0 [ 201.292824][ T9375] vfs_get_tree+0x89/0x2f0 [ 201.297261][ T9375] do_mount+0x1306/0x1b40 [ 201.301226][ T9378] FAULT_INJECTION: forcing a failure. [ 201.301226][ T9378] name failslab, interval 1, probability 0, space 0, times 0 [ 201.301596][ T9375] ? copy_mount_string+0x40/0x40 [ 201.319101][ T9375] ? __might_fault+0x190/0x1d0 [ 201.323870][ T9375] ? _copy_from_user+0x13c/0x1a0 [ 201.328823][ T9375] ? memdup_user+0x7c/0xd0 [ 201.333248][ T9375] __x64_sys_mount+0x18f/0x230 [ 201.338019][ T9375] do_syscall_64+0xf6/0x7d0 [ 201.342531][ T9375] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 201.348420][ T9375] RIP: 0033:0x45ca59 [ 201.352315][ T9375] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 201.371925][ T9375] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 201.380344][ T9375] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 201.388323][ T9375] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 201.396302][ T9375] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 07:05:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) [ 201.404288][ T9375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 201.412264][ T9375] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4 [ 201.451175][ T9378] CPU: 0 PID: 9378 Comm: syz-executor.5 Not tainted 5.7.0-syzkaller #0 [ 201.459452][ T9378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.469510][ T9378] Call Trace: [ 201.472805][ T9378] dump_stack+0x188/0x20d [ 201.477142][ T9378] should_fail.cold+0x5/0xa [ 201.481648][ T9378] ? lock_downgrade+0x840/0x840 [ 201.486500][ T9378] ? fault_create_debugfs_attr+0x140/0x140 [ 201.492308][ T9378] ? fs_reclaim_release+0xa/0x20 [ 201.497255][ T9378] should_failslab+0x5/0xf [ 201.501669][ T9378] kmem_cache_alloc_node_trace+0x27c/0x790 [ 201.507478][ T9378] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 201.513476][ T9378] __kmalloc_node_track_caller+0x38/0x60 [ 201.519125][ T9378] __kmalloc_reserve.isra.0+0x39/0xe0 [ 201.524506][ T9378] __alloc_skb+0xef/0x5a0 [ 201.528843][ T9378] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 201.534394][ T9378] ? netlink_autobind.isra.0+0x21b/0x300 [ 201.540035][ T9378] netlink_sendmsg+0x97b/0xe10 [ 201.544805][ T9378] ? aa_af_perm+0x260/0x260 07:05:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x0, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) [ 201.549308][ T9378] ? netlink_unicast+0x740/0x740 [ 201.554262][ T9378] ? netlink_unicast+0x740/0x740 [ 201.559207][ T9378] sock_sendmsg+0xcf/0x120 [ 201.563636][ T9378] ____sys_sendmsg+0x6e6/0x810 [ 201.568410][ T9378] ? kernel_sendmsg+0x50/0x50 [ 201.573088][ T9378] ? _parse_integer+0x180/0x180 [ 201.577936][ T9378] ___sys_sendmsg+0x100/0x170 [ 201.582587][ T9378] ? debug_smp_processor_id+0x2f/0x185 [ 201.588040][ T9378] ? sendmsg_copy_msghdr+0x70/0x70 [ 201.593132][ T9378] ? __fget_files+0x32f/0x500 [ 201.597785][ T9378] ? ksys_dup3+0x3c0/0x3c0 [ 201.602209][ T9378] ? debug_smp_processor_id+0x2f/0x185 [ 201.607643][ T9378] ? __fget_light+0x20e/0x270 [ 201.612295][ T9378] __sys_sendmsg+0xe5/0x1b0 [ 201.616773][ T9378] ? __sys_sendmsg_sock+0xb0/0xb0 [ 201.621770][ T9378] ? vfs_write+0x161/0x5d0 [ 201.626169][ T9378] ? do_syscall_64+0x21/0x7d0 [ 201.630826][ T9378] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 201.636803][ T9378] do_syscall_64+0xf6/0x7d0 [ 201.641282][ T9378] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 201.647148][ T9378] RIP: 0033:0x45ca59 [ 201.651017][ T9378] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 201.670606][ T9378] RSP: 002b:00007f59f2f01c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.678991][ T9378] RAX: ffffffffffffffda RBX: 00000000004fe3e0 RCX: 000000000045ca59 [ 201.686937][ T9378] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 07:05:11 executing program 3 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) 07:05:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x0, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) [ 201.694892][ T9378] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 201.702838][ T9378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 201.710803][ T9378] R13: 0000000000000945 R14: 00000000004cc0c7 R15: 00007f59f2f026d4 07:05:11 executing program 4 (fault-call:1 fault-nth:20): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 07:05:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0) 07:05:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) 07:05:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x0, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20) [ 201.849897][ T9394] FAULT_INJECTION: forcing a failure. [ 201.849897][ T9394] name failslab, interval 1, probability 0, space 0, times 0 [ 201.863026][ T9394] CPU: 0 PID: 9394 Comm: syz-executor.3 Not tainted 5.7.0-syzkaller #0 [ 201.871276][ T9394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.881332][ T9394] Call Trace: [ 201.884630][ T9394] dump_stack+0x188/0x20d [ 201.888972][ T9394] should_fail.cold+0x5/0xa [ 201.893488][ T9394] ? fault_create_debugfs_attr+0x140/0x140 [ 201.899305][ T9394] ? arch_local_save_flags+0x19/0x40 [ 201.904599][ T9394] should_failslab+0x5/0xf [ 201.909025][ T9394] kmem_cache_alloc_node_trace+0x27c/0x790 [ 201.914836][ T9394] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 201.920826][ T9394] __kmalloc_node_track_caller+0x38/0x60 [ 201.926468][ T9394] __kmalloc_reserve.isra.0+0x39/0xe0 [ 201.931851][ T9394] __alloc_skb+0xef/0x5a0 [ 201.936193][ T9394] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 201.941748][ T9394] ? netlink_autobind.isra.0+0x21b/0x300 [ 201.947387][ T9394] netlink_sendmsg+0x97b/0xe10 [ 201.952166][ T9394] ? aa_af_perm+0x260/0x260 [ 201.956677][ T9394] ? netlink_unicast+0x740/0x740 [ 201.961636][ T9394] ? netlink_unicast+0x740/0x740 [ 201.966584][ T9394] sock_sendmsg+0xcf/0x120 [ 201.971010][ T9394] ____sys_sendmsg+0x6e6/0x810 [ 201.975791][ T9394] ? kernel_sendmsg+0x50/0x50 [ 201.980507][ T9394] ? lock_downgrade+0x840/0x840 [ 201.985373][ T9394] ___sys_sendmsg+0x100/0x170 [ 201.990068][ T9394] ? sendmsg_copy_msghdr+0x70/0x70 [ 201.995189][ T9394] ? retint_kernel+0x2b/0x2b [ 201.999781][ T9394] ? trace_hardirqs_on_caller+0x64/0x240 [ 202.005417][ T9394] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 202.010880][ T9394] ? smp_apic_timer_interrupt+0x1b6/0x600 [ 202.016602][ T9394] ? retint_kernel+0x2b/0x2b [ 202.021204][ T9394] ? sockfd_lookup_light+0x69/0x170 [ 202.026410][ T9394] ? sockfd_lookup_light+0x6e/0x170 [ 202.031616][ T9394] __sys_sendmsg+0xe5/0x1b0 [ 202.036123][ T9394] ? __sys_sendmsg_sock+0xb0/0xb0 [ 202.041170][ T9394] ? do_syscall_64+0x4f/0x7d0 [ 202.045856][ T9394] do_syscall_64+0xf6/0x7d0 [ 202.050364][ T9394] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 202.056253][ T9394] RIP: 0033:0x45ca59 [ 202.060156][ T9394] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 202.079759][ T9394] RSP: 002b:00007f58edd7ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 202.088175][ T9394] RAX: ffffffffffffffda RBX: 00000000004fe3e0 RCX: 000000000045ca59 [ 202.096148][ T9394] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 202.104120][ T9394] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 202.112095][ T9394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 202.120068][ T9394] R13: 0000000000000945 R14: 00000000004cc0c7 R15: 00007f58edd7f6d4 [ 202.152243][ T9400] FAULT_INJECTION: forcing a failure. [ 202.152243][ T9400] name failslab, interval 1, probability 0, space 0, times 0 [ 202.198565][ T9400] CPU: 0 PID: 9400 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 202.206834][ T9400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.216890][ T9400] Call Trace: [ 202.220190][ T9400] dump_stack+0x188/0x20d [ 202.224533][ T9400] should_fail.cold+0x5/0xa [ 202.229047][ T9400] ? fault_create_debugfs_attr+0x140/0x140 [ 202.234855][ T9400] ? idr_replace+0xee/0x160 [ 202.239368][ T9400] should_failslab+0x5/0xf [ 202.243787][ T9400] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 202.249164][ T9400] ? up_write+0x148/0x470 [ 202.253504][ T9400] proc_fill_super+0x79/0x5c0 [ 202.258183][ T9400] ? proc_parse_param+0x8a0/0x8a0 [ 202.263216][ T9400] vfs_get_super+0x12e/0x2d0 [ 202.267811][ T9400] vfs_get_tree+0x89/0x2f0 [ 202.272236][ T9400] do_mount+0x1306/0x1b40 [ 202.276688][ T9400] ? copy_mount_string+0x40/0x40 [ 202.281629][ T9400] ? __might_fault+0x190/0x1d0 [ 202.286394][ T9400] ? _copy_from_user+0x13c/0x1a0 [ 202.291342][ T9400] ? memdup_user+0x7c/0xd0 [ 202.295770][ T9400] __x64_sys_mount+0x18f/0x230 [ 202.300540][ T9400] do_syscall_64+0xf6/0x7d0 [ 202.305056][ T9400] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 202.310944][ T9400] RIP: 0033:0x45ca59 [ 202.314837][ T9400] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 202.334441][ T9400] RSP: 002b:00007ff9ef024c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 202.342858][ T9400] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 202.350832][ T9400] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 202.358805][ T9400] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 202.366778][ T9400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 202.374889][ T9400] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0256d4 [ 202.421602][ T9400] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN [ 202.433375][ T9400] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 202.441874][ T9400] CPU: 0 PID: 9400 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 202.450104][ T9400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.460178][ T9400] RIP: 0010:proc_kill_sb+0x4d/0x110 [ 202.465374][ T9400] Code: c1 ea 03 80 3c 02 00 0f 85 ad 00 00 00 49 8b ac 24 68 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7d 08 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 a1 00 00 00 4c 8b 6d 08 4d 85 ed 74 0d e8 cb 51 [ 202.484973][ T9400] RSP: 0018:ffffc900080a7d48 EFLAGS: 00010202 [ 202.491052][ T9400] RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffc9001251a000 [ 202.499025][ T9400] RDX: 0000000000000001 RSI: ffffffff81e37c9d RDI: 0000000000000008 [ 202.506990][ T9400] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 07:05:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:12 executing program 0 (fault-call:1 fault-nth:0): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) 07:05:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0x0, 0x0, 0x0, 0x400001}}, 0x20) 07:05:12 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) [ 202.514960][ T9400] R10: ffffffff8c347a2f R11: fffffbfff1868f45 R12: ffff88809dc9a000 [ 202.522926][ T9400] R13: 00000000fffffff4 R14: 0000000000000000 R15: ffff88809dc9a068 [ 202.530897][ T9400] FS: 00007ff9ef025700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 202.539817][ T9400] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 202.546400][ T9400] CR2: 00007ffcdb23fe7c CR3: 0000000094060000 CR4: 00000000001406f0 [ 202.554370][ T9400] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 202.562339][ T9400] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 202.570304][ T9400] Call Trace: [ 202.573594][ T9400] deactivate_locked_super+0x8c/0xf0 [ 202.578875][ T9400] vfs_get_super+0x258/0x2d0 [ 202.583466][ T9400] vfs_get_tree+0x89/0x2f0 [ 202.587019][ T9415] FAULT_INJECTION: forcing a failure. [ 202.587019][ T9415] name failslab, interval 1, probability 0, space 0, times 0 [ 202.600452][ T9400] do_mount+0x1306/0x1b40 [ 202.600469][ T9400] ? copy_mount_string+0x40/0x40 [ 202.600483][ T9400] ? __might_fault+0x190/0x1d0 [ 202.600496][ T9400] ? _copy_from_user+0x13c/0x1a0 [ 202.600512][ T9400] ? memdup_user+0x7c/0xd0 [ 202.600532][ T9400] __x64_sys_mount+0x18f/0x230 [ 202.627741][ T9415] CPU: 1 PID: 9415 Comm: syz-executor.0 Not tainted 5.7.0-syzkaller #0 [ 202.628552][ T9400] do_syscall_64+0xf6/0x7d0 [ 202.636747][ T9415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.636756][ T9415] Call Trace: [ 202.641243][ T9400] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 202.651271][ T9415] dump_stack+0x188/0x20d [ 202.654534][ T9400] RIP: 0033:0x45ca59 [ 202.660412][ T9415] should_fail.cold+0x5/0xa [ 202.664707][ T9400] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 202.668572][ T9415] ? lock_downgrade+0x840/0x840 [ 202.673038][ T9400] RSP: 002b:00007ff9ef024c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 202.692634][ T9415] ? fault_create_debugfs_attr+0x140/0x140 [ 202.697446][ T9400] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59 [ 202.705828][ T9415] ? netlink_insert+0x180/0x1590 [ 202.711593][ T9400] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0 [ 202.719541][ T9415] ? trace_hardirqs_on+0x5f/0x230 [ 202.724440][ T9400] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 202.732386][ T9415] ? netlink_insert+0x180/0x1590 [ 202.737371][ T9400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 202.745328][ T9415] should_failslab+0x5/0xf [ 202.750230][ T9400] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0256d4 [ 202.758178][ T9415] kmem_cache_alloc_node+0x25c/0x760 [ 202.762554][ T9400] Modules linked in: [ 202.770522][ T9415] __alloc_skb+0xba/0x5a0 [ 202.783972][ T9415] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 202.789523][ T9415] ? netlink_autobind.isra.0+0x21b/0x300 [ 202.795149][ T9415] netlink_sendmsg+0x97b/0xe10 [ 202.799906][ T9415] ? aa_af_perm+0x260/0x260 [ 202.804405][ T9415] ? netlink_unicast+0x740/0x740 [ 202.809342][ T9415] ? netlink_unicast+0x740/0x740 [ 202.814275][ T9415] sock_sendmsg+0xcf/0x120 [ 202.818691][ T9415] ____sys_sendmsg+0x6e6/0x810 [ 202.823452][ T9415] ? kernel_sendmsg+0x50/0x50 [ 202.828128][ T9415] ? _parse_integer+0x180/0x180 [ 202.832976][ T9415] ? lock_acquire+0x1f2/0x8f0 [ 202.837674][ T9415] ___sys_sendmsg+0x100/0x170 [ 202.842233][ T9400] ---[ end trace 0b1f0a2b8427ddfe ]--- [ 202.842343][ T9415] ? sendmsg_copy_msghdr+0x70/0x70 [ 202.850170][ T9400] RIP: 0010:proc_kill_sb+0x4d/0x110 [ 202.852864][ T9415] ? __fget_files+0x32f/0x500 [ 202.858088][ T9400] Code: c1 ea 03 80 3c 02 00 0f 85 ad 00 00 00 49 8b ac 24 68 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7d 08 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 a1 00 00 00 4c 8b 6d 08 4d 85 ed 74 0d e8 cb 51 [ 202.862675][ T9415] ? ksys_dup3+0x3c0/0x3c0 [ 202.886643][ T9415] ? fsnotify+0x7df/0xb50 [ 202.890971][ T9415] ? __fget_light+0x20e/0x270 [ 202.895658][ T9415] __sys_sendmsg+0xe5/0x1b0 [ 202.900162][ T9415] ? __sys_sendmsg_sock+0xb0/0xb0 [ 202.905179][ T9415] ? vfs_write+0x161/0x5d0 [ 202.905698][ T9400] RSP: 0018:ffffc900080a7d48 EFLAGS: 00010202 [ 202.909588][ T9415] ? entry_SYSCALL_64_after_hwframe+0x4e/0xb3 [ 202.921674][ T9415] ? trace_hardirqs_off_caller+0x55/0x230 [ 202.927394][ T9415] do_syscall_64+0xf6/0x7d0 [ 202.931002][ T9400] RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffc9001251a000 [ 202.931891][ T9415] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 202.945705][ T9415] RIP: 0033:0x45ca59 [ 202.949593][ T9415] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 202.969190][ T9415] RSP: 002b:00007fc20ca99c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 202.973855][ T9400] RDX: 0000000000000001 RSI: ffffffff81e37c9d RDI: 0000000000000008 [ 202.977676][ T9415] RAX: ffffffffffffffda RBX: 00000000004fe3e0 RCX: 000000000045ca59 [ 202.977683][ T9415] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 202.977689][ T9415] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 202.977695][ T9415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 07:05:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) r4 = dup2(r2, r3) write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0x0, 0x0, 0x0, 0x400001}}, 0x20) 07:05:12 executing program 3 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) socket(0x0, 0x0, 0x0) 07:05:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0) [ 202.977702][ T9415] R13: 0000000000000945 R14: 00000000004cc0c7 R15: 00007fc20ca9a6d4 07:05:12 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) [ 203.119889][ T9428] FAULT_INJECTION: forcing a failure. [ 203.119889][ T9428] name failslab, interval 1, probability 0, space 0, times 0 [ 203.146919][ T9400] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 203.150132][ T9428] CPU: 1 PID: 9428 Comm: syz-executor.3 Tainted: G D 5.7.0-syzkaller #0 [ 203.164537][ T9428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.174569][ T9428] Call Trace: [ 203.177842][ T9428] dump_stack+0x188/0x20d [ 203.182152][ T9428] should_fail.cold+0x5/0xa [ 203.186632][ T9428] ? fault_create_debugfs_attr+0x140/0x140 [ 203.192412][ T9428] ? lock_acquire+0x1f2/0x8f0 [ 203.197064][ T9428] ? netlink_deliver_tap+0x146/0xb50 [ 203.202324][ T9428] should_failslab+0x5/0xf [ 203.206715][ T9428] kmem_cache_alloc+0x44/0x740 [ 203.211456][ T9428] ? lock_downgrade+0x840/0x840 [ 203.216285][ T9428] skb_clone+0x14d/0x3c0 [ 203.220502][ T9428] netlink_deliver_tap+0x91c/0xb50 [ 203.225593][ T9428] netlink_unicast+0x5e9/0x740 [ 203.230332][ T9428] ? netlink_attachskb+0x810/0x810 [ 203.235418][ T9428] ? _copy_from_iter_full+0x25c/0x870 [ 203.240763][ T9428] ? __phys_addr_symbol+0x2c/0x70 [ 203.245765][ T9428] ? __check_object_size+0x171/0x437 [ 203.251028][ T9428] netlink_sendmsg+0x882/0xe10 [ 203.255772][ T9428] ? aa_af_perm+0x260/0x260 [ 203.260269][ T9428] ? netlink_unicast+0x740/0x740 [ 203.265185][ T9428] ? netlink_unicast+0x740/0x740 [ 203.270099][ T9428] sock_sendmsg+0xcf/0x120 [ 203.274492][ T9428] ____sys_sendmsg+0x6e6/0x810 [ 203.279232][ T9428] ? kernel_sendmsg+0x50/0x50 [ 203.283896][ T9428] ? _parse_integer+0x180/0x180 [ 203.288741][ T9428] ? lock_acquire+0x1f2/0x8f0 [ 203.293421][ T9428] ___sys_sendmsg+0x100/0x170 [ 203.298103][ T9428] ? sendmsg_copy_msghdr+0x70/0x70 [ 203.303197][ T9428] ? __fget_files+0x32f/0x500 [ 203.307939][ T9428] ? ksys_dup3+0x3c0/0x3c0 [ 203.312345][ T9428] ? fsnotify+0x7df/0xb50 [ 203.316654][ T9428] ? __fget_light+0x20e/0x270 [ 203.321310][ T9428] __sys_sendmsg+0xe5/0x1b0 [ 203.325792][ T9428] ? __sys_sendmsg_sock+0xb0/0xb0 [ 203.330804][ T9428] ? vfs_write+0x161/0x5d0 [ 203.335198][ T9428] ? ret_from_intr+0x2b/0x2b [ 203.339762][ T9428] ? trace_hardirqs_off_caller+0x55/0x230 [ 203.345474][ T9428] do_syscall_64+0xf6/0x7d0 [ 203.349966][ T9428] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 203.355831][ T9428] RIP: 0033:0x45ca59 [ 203.359702][ T9428] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 203.379287][ T9428] RSP: 002b:00007f58edd7ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 203.387670][ T9428] RAX: ffffffffffffffda RBX: 00000000004fe3e0 RCX: 000000000045ca59 [ 203.395625][ T9428] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 203.403570][ T9428] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 203.411527][ T9428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 203.419485][ T9428] R13: 0000000000000945 R14: 00000000004cc0c7 R15: 00007f58edd7f6d4 [ 203.446561][ T9400] R10: ffffffff8c347a2f R11: fffffbfff1868f45 R12: ffff88809dc9a000 [ 203.475122][ T9400] R13: 00000000fffffff4 R14: 0000000000000000 R15: ffff88809dc9a068 [ 203.486370][ T9400] FS: 00007ff9ef025700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 203.497992][ T9400] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 203.504633][ T9400] CR2: 0000001b2ea22000 CR3: 0000000094060000 CR4: 00000000001406f0 [ 203.512804][ T9400] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 203.524597][ T9400] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 203.532805][ T9400] Kernel panic - not syncing: Fatal exception [ 203.540046][ T9400] Kernel Offset: disabled [ 203.544362][ T9400] Rebooting in 86400 seconds..