c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:19 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3c0000002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:19 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3485.113354][T19744] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3485.124091][T19744] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="394800006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000251300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="c00000002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:19 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x49804080, &(0x7f00000003c0), 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="b910b0a4149f0e9a", 0x8}], 0x1, 0x6) ptrace$setopts(0x4206, r0, 0x0, 0x22) wait4(0x0, 0x0, 0x0, 0x0) [ 3485.260576][T19797] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3485.297216][T19797] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:22 executing program 5: ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) mknod(&(0x7f0000000ffa)='./bus\x00', 0x1000, 0x0) r0 = open(&(0x7f000054a000)='./bus\x00', 0xb00, 0x0) r1 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x10}) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x10000, 0x191) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000140)={0xa0002000}) open(&(0x7f00000000c0)='./bus\x00', 0x202, 0x0) 06:27:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="394c00006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:22 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="c00e00002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000481300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:22 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x49804080, &(0x7f00000003c0), 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0), 0xd4ba0ff) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="ce83b0ad54a7b41117eb6d0ec00a533bd7bfe6ca44336f6b57604ebf468b6e8aa8f382c6a98e07708a58b09094bdff2ef0d965c26ccb85f8eec8b14b9a3e8208241c705f5c277d08073819b0a0e006c8", 0x50}], 0x1, 0x4) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) ptrace$setopts(0x4206, r0, 0x0, 0x22) wait4(0x0, 0x0, 0x0, 0x0) clone(0x8000000, &(0x7f0000000a00)="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", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="b364e4b8211caf9691128c904bf3c2b3a5a4fca98f5c42916081a0f0fcb1f6e6e95bf046f9fe9e461a55504f7a5b2699e6f212cfae72bb74b1c925e17b97dd790f8670371a5489754ca2b83292226430cb16277733f41d721f74d349c0974d88b4c655fcd0250118") 06:27:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="effd00002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3488.145430][T19837] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="396000006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:22 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3488.189163][T19837] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:22 executing program 5: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000340), 0x200040, 0x0) poll(&(0x7f0000000380)=[{0xffffffffffffffff, 0x4}, {0xffffffffffffffff, 0x400}, {r0, 0x100}], 0x3, 0x7) r1 = creat(&(0x7f0000000200)='./file0/file1\x00', 0xd6) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000007, 0x4000010, r1, 0xa79a0000) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) fsetxattr(r2, &(0x7f0000000140)=@known='user.incfs.metadata\x00', &(0x7f0000000180)='threaded\x00', 0x9, 0x1) write$cgroup_type(r1, &(0x7f00000009c0), 0xd4ba0ff) lseek(r2, 0x5, 0x0) ioctl$CHAR_RAW_ROSET(r1, 0x125d, &(0x7f00000001c0)=0x1c) ioctl$sock_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x0, @ipx={0x4, 0x8, 0x1000, "b9b63c75bfd1", 0x6}, @phonet={0x23, 0x1f, 0xe1}, @ethernet={0x6, @random="db1d593b12ef"}, 0x0, 0x0, 0x0, 0x0, 0xfe00, &(0x7f0000000000)='gretap0\x00', 0xe1f5731, 0xfffffffffffffffa, 0x6}) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="020182ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffffa6000000e100000088770072003007005500000000000000008000da55aa", 0x40, 0x1c0}]) write(0xffffffffffffffff, &(0x7f0000000240)="e3854c9af5be76cc7b0f5f52ee8d6ec79156f85e3f32452513e51337e6ddd430361d748b10988689c3b65ae903038704c08ec654f5362d53fed6e7d1ddf66299bda0e79d5c047f4444895f0aa7c291ba81ca14448b52a7a9af2d00c5a7da186856e27ad74b6c99c0564085448411e9846db2e3f39fa3f89857be54bb5f631e815d15ebea9ad91e35287e9946731b90feb4a7af7af78defd62b35a272670cd219591903e1b1bae32b44e6d73f43d58b580a0eeafc5bd7e2d4e0c68b319df8a17b4a7b5a6949298fa4384a42bf4e4f04be953f0473f61ede1d298d36c4326f9967413558", 0xe3) fallocate(r2, 0x8, 0x6, 0x0) r3 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r3, &(0x7f00000009c0), 0xd4ba0ff) setsockopt$sock_void(r3, 0x1, 0x24, 0x0, 0x0) 06:27:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="396800006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="e03f03002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900004c1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="396c00006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:22 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mknodat(r0, &(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x20000, 0x10) open(&(0x7f0000000040)='./file0\x00', 0x200180, 0x8) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) r1 = openat(r0, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) getdents(r1, &(0x7f0000000340)=""/232, 0xe8) 06:27:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="f90000202c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3488.354074][T19897] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3488.385237][T19897] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:25 executing program 0: clone(0x8810e900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x80000000, &(0x7f0000000100)="9f34230ab1f24c951bde5e2ed8b7501ca119e8b93abe5f77e1e7152380258fc28912bdf77c3d7500d5d8cd8c76f0ca9364de1343308bfcefae337ab2039ba60d", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="8efa31d6da8f8bc0e102c1f116091571e98c7ea412194fff03793c41fa1f9fb15f4dae0ce07b6afe54b500467157755fb4dc2aabf503d6c71e06547865a22f48") clone(0x49804080, &(0x7f00000003c0), 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x22) wait4(0x0, 0x0, 0x0, 0x0) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f00000000c0)=0x1000baa) wait4(r1, &(0x7f0000000000), 0x8000000f, &(0x7f0000000040)) 06:27:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="397400006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="00f0ff7f2c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 5: lsetxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)=@v1={0x2, "fc516b90"}, 0x5, 0x2) r0 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) fspick(r0, &(0x7f0000000300)='./file0\x00', 0x1) r1 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0), 0xd4ba0ff) sendmmsg(r1, &(0x7f0000000340), 0x0, 0x6004800) r2 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="6673636f6e746578743d73746166665f752c646f6e745f686173682c009f596eb8228c1d851a4d4082aa6f32408976b294aebe8d7ba0214aeff076208ba9c3ce41ed6342767017a6148f019f0863ed52a42ea78bf7810fac7a8b0a626d7af6a0421ae7f32cd3e04345fa67f12d3c468a59deb7b575d9"]) r3 = openat2(r2, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x2001, 0x210, 0x18}, 0x18) close(r3) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0x40182103, &(0x7f0000000240)={0x0, 0x0, r3, 0x1}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x101000, 0x16) r4 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r4, &(0x7f00000009c0), 0xd4ba0ff) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000340)={0x0, r0, 0x9, 0x20000000, 0xae, 0x5}) mkdirat(r3, &(0x7f0000000100)='./file0\x00', 0x0) 06:27:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000601300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="397a00006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3491.181331][T19912] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3491.196510][T19912] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="effdffff2c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390003006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001000034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3491.297841][T19939] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 06:27:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@dev, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="20002cbd7000ffdbdf25060000004800018008000300030000000800030001000000080003000200000008000300010000001400020076657468315f6d61637674617000000008000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB], 0x5c}, 0x1, 0x0, 0x0, 0x400c040}, 0x24040855) 06:27:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000681300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 5: ioctl$FS_IOC_READ_VERITY_METADATA(0xffffffffffffffff, 0xc0286687, &(0x7f0000000140)={0x2, 0x81, 0xc8, &(0x7f0000000600)=""/200}) r0 = openat(0xffffffffffffffff, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) r2 = dup(r1) write$cgroup_type(r2, &(0x7f0000000dc0), 0x9) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000200)=""/198, 0xc6}, {&(0x7f0000000380)=""/110, 0x6e}, {&(0x7f0000000040)=""/55, 0x37}, {&(0x7f0000000400)=""/156, 0x9c}, {&(0x7f00000004c0)=""/186, 0xba}, {&(0x7f0000000700)=""/210, 0xd2}], 0x6, 0xd9f, 0x2) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000fc0), 0x0, 0x0) fdatasync(r3) preadv(r1, &(0x7f0000000cc0)=[{&(0x7f0000000800)=""/40, 0x28}, {&(0x7f0000000840)=""/122, 0x7a}, {&(0x7f00000008c0)=""/123, 0x7b}, {&(0x7f0000000940)=""/105, 0x69}, {&(0x7f0000000a00)=""/82, 0x52}, {&(0x7f0000000a80)=""/113, 0x71}, {&(0x7f0000000b00)=""/138, 0x8a}, {&(0x7f0000000bc0)=""/239, 0xef}], 0x8, 0x20, 0x7) sendmsg$AUDIT_USER(r1, &(0x7f0000000ec0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x44, 0x3ed, 0x100, 0x70bd27, 0x25dfdbfd, "c3d30376ad3f2e4053e9aaff3258c5de46dba16b6ba34c98c9f6ec1efb9a0d895081d83153bb8d0d61e80d48fc6f488993fc3f", ["", "", "", "", "", "", "", "", "", ""]}, 0x44}, 0x1, 0x0, 0x0, 0x20008000}, 0x10) time(&(0x7f0000000180)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000f00)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f0000000f80)='comm\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14009902, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f002e00010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="0ef59f7760ebb2a0a880282d62bffc9f575d073de7c30b517dfbd1146b1eb8983fbddfb807baeb75689e8f77646b71c457cb24c0dc330dea7e853dd5933d4378db720afa2cc7909031c949d5e83f2cee00"/90]) 06:27:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001100034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390005006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3491.374697][T19966] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 3491.387615][T19970] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001200034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3491.417344][T19974] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 06:27:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900006c1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390006006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ipv6_route\x00') openat(r0, &(0x7f0000000100)='./file0\x00', 0x550102, 0x1) lseek(r0, 0x6, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000140)=ANY=[@ANYBLOB="040353e6155382e2dd7cc51185c48e807092211ed9220891149d664029dad6004a7e35f8d69e5f4a5b0800ddc64013222b0422fc7b3accf99f7af9d7db47e41ee13e4be4beec927179320d8a362ee59fb5079e2ea17e3c8a0f344125bf8a16bfb344318801d3bec5e0dd570b5c121f097939fcfa0ec91c87a3371280775988911454afd6ac369d15a02807942ddbc6ac6f0bf507225c00146dd53b3554474732d4a12236595098f60000"], 0x14, 0x1) ioctl$F2FS_IOC_RESIZE_FS(0xffffffffffffffff, 0x4008f510, &(0x7f0000000280)=0x40) r1 = syz_open_dev$vcsa(&(0x7f0000000080), 0x26, 0x22000) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000240)) r2 = open(&(0x7f00000002c0)='./file0\x00', 0x400, 0x103) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000300)) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000340)=0x1) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/24, 0x18}], 0x1, 0x80000000, 0x0) 06:27:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001200)={[{@nr_blocks={'nr_blocks', 0x3d, [0x4d]}}]}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0/file0\x00', 0x3, 0x3, &(0x7f0000000200)=[{&(0x7f0000000380)="85cdfb10a6fcbd17194f412d2a76b16e932ece7d6b753bd9ca095767e73154263f33b9be2b391b1a29124a12bd64c77b0915e36c078a0e45b84b3baca8f7733b3fd4fec3810c88ba1f676575f300a420650d88a4a9926cb90b03eeb1dc7658f43cb615f3b7b8bdef9bc158d4bd488ed9a2218ce779064f90445a81a57d2cafd7b6371c5b53d7a15b4d899ba294ce2db9cc7013324e59a029c7d5bb5a33c822eca4359d62ce6e69f7bbda67658da5fe2aad144dccff5647d2d8379df552a555edeede933dfc8760fe21c92f84d062239fbc9ed69b2aca1edf5c75e0a72f0a8c97809727ce0b142bf27cb1e545c398665bc838417285476b10b37b5dd9c08ba2377fd48c4f982b909f3a1420de9410cf0a2db316699f3baa0de2c71519552cb27c3e54be6db4cdca7b611f80977c9d84c4a537704c5e06e6775ec43f", 0x13b, 0x8000}, {&(0x7f0000000180)="97397bc352c44a19e819f89a2daed81d0f1ffa3457fed06e08c3fa88f476b7f1", 0x20, 0xfffffffffffffffd}, {&(0x7f00000001c0)="7341d89d1682583a34cf20a121f5ea8d5be024dad0e8f2a6c26af3bbf3406bf7e43714fd3d16df16c596b67db137bb68a2d518", 0x33, 0x1}], 0x10c0000, &(0x7f0000000300)={[{@nr_blocks={'nr_blocks', 0x3d, [0x33]}}, {@mode={'mode', 0x3d, 0xbf9}}, {@nr_inodes={'nr_inodes', 0x3d, [0x30, 0x25, 0x37, 0x35]}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}) [ 3491.488062][T19974] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 06:27:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000741300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390007006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001500034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 5: r0 = socket$unix(0x1, 0x800000000005, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = accept(r0, 0x0, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r3 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r3, &(0x7f00000009c0), 0xd4ba0ff) sendmsg$unix(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYRES32=r0, @ANYRES16=r0, @ANYRES16=r3], 0x1c, 0x20000000}, 0x0) close(r0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)="94d540938e3a7d8ec6073fd8db9f0a78ce734119d578e935f69ea513a8818760aaac4ffadc8e34529547bc7dabf98521951a", 0x32, r1}, 0x68) r4 = socket$unix(0x1, 0x5, 0x0) close(r4) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f00000001c0)={0x3, 0xfa, "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"}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="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", 0xff, r4}, 0x68) 06:27:25 executing program 0: r0 = syz_io_uring_setup(0x15b2, &(0x7f0000000140)={0x0, 0x0, 0x20}, &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000040)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000040)={0x6080, 0x0, 0x17}, &(0x7f0000000080)='./file0\x00', 0x18, 0x0, 0x23456, {0x0, r3}}, 0xfffff000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000006c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r5, &(0x7f0000000200)=[{&(0x7f0000000140)=""/71, 0x47}], 0x1, 0x6befa462, 0x0) 06:27:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900007a1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390009006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000901300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001600034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x4077e0, &(0x7f0000000500)={0x0, 0x0, 0x10, 0x0, 0x3}, &(0x7f0000631000/0x4000)=nil, &(0x7f0000787000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000001440)=0x0) syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000100)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x2000, @fd_index=0x4, 0x0, 0x0, 0x0, 0x1f}, 0x0) r5 = accept$inet(r1, &(0x7f0000000040)={0x2, 0x0, @private}, &(0x7f0000000080)=0x10) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f00000000c0)=@IORING_OP_SEND={0x1a, 0x2, 0x0, r5, 0x0, &(0x7f0000000140)="ac479ca5e30f1f217142c25b9f0422ce25ca22f2d54ca8de6e8ed6e8e44accd580caff48b8517eab022ec143abc690d902aaf8d3f632357f87779dafc438e0b46d29163fb42114efda94d36434a51ff533851c1b8f9a3297bceebfbd93c65e993372ea88772a7c320ef888ba6be51a9d7128d1a3c9aa58a9457da919cf1b8a4720eeab2e9f828add83912a2ca0748793b14cefbfb1e47dcbe36f7056e25ee10c7020e92f411218a052f8915a68", 0xad, 0x24000000, 0x1, {0x0, r6}}, 0x2) 06:27:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000a006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 5: perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0xbc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="1c000000000201040000a765513900000c00000908000540000000bbb8a0150a331a4aec89eb5fe340cb5f53a547806eb2fc98d2b2bac60bb8b73ce28d75b029902909e667d89237f74b24eb1c2672a25f0410b271420b6a6a6f05e0e4653c15f5debce0c32f9f13d77c6245eefe99b97e2cebd913a368110e6cfaf39f14ac2e8a2b0b5ce09cdfcbf85dc5446f3b270a03ce94af83c2e5d59283537a94ec0d6f2899f48b4331ddcdb6e0aba8fccfdd8b2b5bdf"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x1) perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0xff, 0x7, 0x1, 0x0, 0x0, 0x8, 0x0, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, 0x1, @perf_config_ext={0x7ff, 0x5c6}, 0x10004, 0x418, 0x3f, 0x8fc166dda64649cc, 0x1, 0xb9, 0x0, 0x0, 0x1517, 0x0, 0x2}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x5) eventfd2(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfb, 0x1ff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xaa}, 0x0, 0x0, r1, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 06:27:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xe, 0x5ee}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) sched_setattr(0x0, &(0x7f00000003c0)={0x38, 0x0, 0x0, 0x7406, 0x9, 0x0, 0x1, 0x0, 0x3ff}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = accept(r0, &(0x7f00000000c0)=@rc={0x1f, @none}, &(0x7f0000000140)=0x80) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e24, 0xffff, @empty, 0x8001}, 0x1c) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480), 0x30000, 0x0) close(r2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) getrlimit(0xc, &(0x7f0000000000)) clone3(&(0x7f0000000640)={0x0, &(0x7f00000004c0), 0x0, 0x0, {}, &(0x7f0000000580)=""/44, 0x2c, 0x0, &(0x7f0000000600)=[0x0], 0x1}, 0x58) sendmmsg$sock(r1, &(0x7f0000000440)=[{{&(0x7f00000001c0)=@tipc=@name={0x1e, 0x2, 0x3, {{0x41, 0x2}, 0x4}}, 0x80, &(0x7f0000000240)=[{&(0x7f00000002c0)="aa40bd23d8b7db40dbb3b4a5fa89e8fd0b7cfc494a222e63268b278079b7969d95a3ba54ee357a8737c01088b6aa5a4455795ed1a6b75de3193fe95332b806b0d10d5e1c72a0f902b19af303b9fadf4aee7bc9d39549e26e54e970011540f4e6b82f4b0368b6b3b4928ec57a3b87e47645fa09d326e522ea1a2f299bceedc1daa5bd10b6c397aa10c9def0682c33e20d169948e2a6d81ecd54ba45a40caef7e4176e1046ecd847cf25a163718a9fd1ee9a7aa16151c76ebea4cb025d8f115a1411a5813fe188e9739ff0d7862be0322213cf", 0xd2}], 0x1, &(0x7f0000000400)=[@txtime={{0x18, 0x1, 0x3d, 0x79dd14e1}}], 0x18}}], 0x1, 0x8001) 06:27:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000c01300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000b006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001900034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000e81300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:26 executing program 0: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/module/cpuidle_haltpoll', 0x2, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0), 0xd4ba0ff) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0), 0x5) 06:27:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000c006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000d006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x25}, {0x14}, {0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x20010, r0, 0x8000000) syz_io_uring_setup(0x38e3, &(0x7f00000000c0)={0x0, 0x7dfd, 0x1, 0x3, 0x27a, 0x0, r0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd=r0, 0x0, 0x0, 0x0, {0x1e000}, 0x1}, 0x1) r3 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r3, &(0x7f00000009c0), 0xd4ba0ff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x300000e, 0x100010, r3, 0xb39c2000) 06:27:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000fd1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x40, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000240)="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", 0x180, 0x400}], 0x0, &(0x7f0000000140)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0xfb, 0x15, 0x0, 0x7f, "08da18d93ddcb606c8d3dfbdeb701e63"}, 0x15, 0xffb64db70ee15a45) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) truncate(&(0x7f0000000080)='./file0\x00', 0x401) 06:27:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xa0, 0x0, 0x8, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x6, 0x21}}}}, [@NL80211_ATTR_QOS_MAP={0xc, 0xc7, {[], "bda9f83fa86c4b91"}}, @NL80211_ATTR_QOS_MAP={0xe, 0xc7, {[{0x5, 0x2}], "9e4636c34b1e75a7"}}, @NL80211_ATTR_QOS_MAP={0x30, 0xc7, {[{0x20, 0x6}, {0x2, 0x4}, {0x3, 0x3}, {0x6, 0x7}, {0x1, 0x1}, {0x20, 0x1}, {0x7}, {0x8, 0x6}, {0x80, 0x4}, {0x3d, 0x5}, {0x4, 0x6}, {0xfc, 0x5}, {0x77, 0x6}, {0x1, 0x4}, {0x74}, {0x6, 0x2}, {}, {0x9}], "3d49ed8a52150a4a"}}, @NL80211_ATTR_QOS_MAP={0x16, 0xc7, {[{0x3f, 0x4}, {0x1, 0x1}, {0x7, 0x6}, {0x6, 0x4}, {0x1f, 0x2}], "cfa31785b2c8c1f7"}}, @NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{0x7, 0x6}, {0x6, 0x4}, {0x9, 0x5}, {0x3f, 0x4}], "36f759a1dd4a3d8d"}}]}, 0xa0}, 0x1, 0x0, 0x0, 0x44008}, 0x180) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xb0, r1, 0x100, 0x70bd28, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@key_params=[@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "1d9f5afecd1b2280ec4e903bdb"}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "4a12e626a6ef7fa2fa33defbe2"}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0xc, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_IDX={0x5}, @NL80211_ATTR_KEY={0x44, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DEFAULT_TYPES={0x20, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_IDX={0x5, 0x2, 0x5}, @NL80211_KEY_TYPE={0x8}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT={0x4}]]}, 0xb0}, 0x1, 0x0, 0x0, 0xc804}, 0x2000c815) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x20000, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x59d}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20040095) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000480), 0x1, 0x0) sendto$inet6(r3, &(0x7f00000004c0)="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", 0x1000, 0x20000000, &(0x7f00000014c0)={0xa, 0x4e20, 0x20, @remote, 0x81}, 0x1c) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001540), r3) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000001680)={'syztnl1\x00', &(0x7f0000001640)={'tunl0\x00', 0x0, 0x8706, 0x700, 0x2, 0x3, {{0x5, 0x4, 0x0, 0x14, 0x14, 0x64, 0x0, 0xff, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x2a}}}}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r3, &(0x7f0000001800)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000017c0)={&(0x7f00000016c0)={0xdc, r4, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x4008085}, 0x40) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001840), 0x20082, 0x0) sendmsg$NL80211_CMD_VENDOR(r6, &(0x7f0000001a40)={&(0x7f0000001880)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001a00)={&(0x7f00000018c0)={0x104, 0x0, 0x8, 0x70bd29, 0x25dfdbfc, {{}, {@void, @void, @val={0xc, 0x99, {0x10001, 0x54}}}}, [@NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x7f}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x52}, @NL80211_ATTR_VENDOR_DATA={0xba, 0xc5, "1d7aee55b2b8e7700c77af55d17cc7cf7accb05d7e06273a45fe4d086418645c5e8098770c57251bcaa850cc63c52a05dd3421cc758e4b385c51b3aa8424cb84ea21eb691de4718babe7d15ebcf70c76f4193aa498ab839773441c3aff749a8b272c8dd8a6376721ebb9ca534b450f6dcdd2b3b287311d208896cb77542d10e1d8df72f01f67aa93346f3e2475704bc8555da15b623a263c6de32f5943c9beabe92c5604b7111f6787c8cc6cb2e598e4ef048c1ba933"}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x5}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x1f}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x8}]}, 0x104}, 0x1, 0x0, 0x0, 0x50}, 0x40) bind$inet6(r2, &(0x7f0000001a80)={0xa, 0x4e22, 0xcca0, @private0, 0x8}, 0x1c) r7 = accept$inet6(r2, &(0x7f0000001ac0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000001b00)=0x1c) sendto$inet6(r7, &(0x7f0000001b40)="e9635c32066d6ca2951fcdf27d8e628fd2661041e46531dcb60a7047bfd6d4f0dd82da4bdadf75b8a4dc10ad1ba24833f6a3605a9b72630868cc0507d6f780d88c2dbd5f7ff2ef", 0x47, 0x800, 0x0, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r3, &(0x7f0000001c80)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001c40)={&(0x7f0000001c00)={0x20, r1, 0x10, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x0, 0x80}}}}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000081}, 0x90) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001cc0), 0x101002, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x8916, &(0x7f0000001d00)={@remote, 0x58, r5}) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001d80)=""/248, 0xf8}, {&(0x7f0000001e80)=""/191, 0xbf}, {&(0x7f0000001f40)=""/93, 0x5d}, {&(0x7f0000001fc0)=""/169, 0xa9}, {&(0x7f0000002080)=""/105, 0x69}, {&(0x7f0000002100)=""/223, 0xdf}, {&(0x7f0000002200)=""/119, 0x77}, {&(0x7f0000002280)=""/135, 0x87}], 0x8, 0x7fffffff, 0x9) 06:27:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000e006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001600034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3492.156166][T20124] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.1'. 06:27:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001d00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:26 executing program 5: set_mempolicy(0x0, &(0x7f0000000000)=0x7cc3, 0xa1) set_mempolicy(0x4000, &(0x7f0000000080)=0x7, 0xe8) unshare(0x40080) unshare(0x0) clone(0xd00c2000, 0x0, 0x0, 0x0, 0x0) 06:27:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390011006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:26 executing program 0: mmap(&(0x7f0000000000/0x7f2000)=nil, 0x7f2000, 0x3, 0x31, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r1, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x300000) ioctl$BTRFS_IOC_QGROUP_CREATE(r2, 0x4010942a, &(0x7f0000000180)={0x1, 0x5}) r3 = accept$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) shmget(0x0, 0x2000, 0x40, &(0x7f0000549000/0x2000)=nil) mlock(&(0x7f000067d000/0x4000)=nil, 0x4000) ioctl$FS_IOC_GETVERSION(r3, 0x80087601, &(0x7f0000000100)) 06:27:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3492.268882][T20145] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3492.290384][T20146] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.4'. 06:27:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001e00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390012006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:26 executing program 5: mlockall(0x3) fork() mlockall(0x2) setuid(0xee01) mlockall(0x1) r0 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006880)=[{&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001840)=[{&(0x7f00000004c0)="fbc14459a778e30aa00a70a70cbd84348b075d2822805b0dcdd2e42777edab5f904e38c9d3cf9720839d52087ae44f72ed6a158387b9f5cc5891d87a341fa519d8cbe378a68dd2b140f4ab2a2e3079b3bebb8f0dea8a3bdac4c5f22cabf46485ccb0b514697409532e64800910ac839a0a0863546e579486e6342226e901b894801f70343a80c06b40e7dac0723d688575e6efff0e8c905764408678b83e72a97e19469ea2e49468bd6ea7fcabb965f193892e8d1ff7a3a15ad5", 0xba}, {&(0x7f0000001740)="b467a1e551a18c91cb45495a49115b7e481f00829cec90be189216e21cadac60149e67762aa08595d8432805d3cec42ebaf8407c6c05adce9b26d57c39f1896fdfa1597d0bdd840cebb1e94439f329b911a083fbc6f5c908b963746fc10b2d65140f057bb1b9ddc23bc7506718fbbcf554a8c003fbd84aa2f0e0dc0eb58d391660aaf3ecff69837086344f", 0x8b}, {&(0x7f0000000680)="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", 0xfef}, {&(0x7f0000001680)="4c41cfa1c08a2148c02b6c23470aebcd74175d5e1489e50fe2f0400d8cbb31b6b1557d329e0d1b98c39ac242af91bd33d7b3db9f8bbe3587f655b172e62016e49695b296adba2af7cbbef43d7b2c58752da149c7b9e5030bea2d90e5a666862deb7051f21bad47ce2588676548db19d417b42bb8a462b795266ce4f21bf611aa04e001c4074cef0db846bc747de3f441e00ac1e5b40db9676373ab6c040f5e0357dfd94f2a6635134b7b50657f196a9cddda2f368bdaec9472d4", 0xba}], 0x4, &(0x7f0000001d40)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r8, @ANYRES32=0x0, @ANYBLOB="00000097f13dcb980024000000000000001ef19749a11c3aba", @ANYRES32, @ANYRES32, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB="0001000000010000000020000000000000000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="00000000903c43f0dfb0ff47f114d64e3b"], 0xb8, 0x1}, {&(0x7f0000001c00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001a40)=[{&(0x7f0000001c80)="0784d649d8125d953aa6053d7ed134c1b5256d4ef8d51118b4d43bb88bcb284e007839bf78561aea34aa0eebf44d0186fb3e02961af2cb1e9b2810f580f496cc5050cbd3d9b1e5e6d3ae5bc26e96f00046c75c550bd5183cfa75bfdc5e29a8c5c460a45e4fc82b5a9c8ef1a78f0c59a790e5174c80f3c1d1db63456b2a16593da59f1dda4099cd721a6ff636145f1fb0d946a15ea4611cd99bf91b55bc39acc58a44ab14758c3ef7785df0", 0xab}, {0x0}, {&(0x7f0000001ec0)="480e3e", 0x3}, {0x0}, {&(0x7f0000000440)="14babe0617ce3d5fa8aefe0661fdc765bb8ca1c0c2f54d3ed8f82e36f4b86b5338bba87245c6acc7e4a456fcab31375fafff0c5d6fb6aba499e53d166d39cbf1d12e03e9d62c50454b4b9465659f8ffeb03058", 0x53}, {&(0x7f0000001940)="e1db2929113170494236c8d870ba896d3f954cd8f131ec728b35e8fb68dff2dc777c34d829059ce618c2301c7ed5a1ca8bfed0486d667edce4cf1b8ca79fee50b333e6f52b6d", 0x46}, {&(0x7f00000019c0)="f9083d3e36a39638ad4cf90ec1715d0156654eab607b3a19aaf557cda5de90c88d5b20deff13fc0fd548fc02c182a01ceb699f88351c2b7c7fd18962ef425cb619eb1c431d47834de25b526a52dcde97eac221f1ea295301aefe07767585e1c95689be1121", 0x65}], 0x7, 0x0, 0x0, 0x200448c1}], 0x2, 0x20004080) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x6, r0}, {0x2, 0x4, 0xee00}, {0x2, 0x6}, {0x2, 0x6, 0xee01}, {0x2, 0x4, r2}], {}, [{0x8, 0x2, r3}, {0x8, 0x1, r4}, {0x8, 0x1}, {0x8, 0x4, r9}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2) setpriority(0x0, 0x0, 0x0) 06:27:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:26 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xdc800, 0xd4, &(0x7f0000000200)=[{&(0x7f0000010000)="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"/1408, 0x580, 0x8000}, {&(0x7f0000010600)="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"/1408, 0x580, 0x8800}, {&(0x7f0000010c00)="ff43443030310100"/32, 0x20, 0x9000}, {&(0x7f0000010d00)="0042454130310100"/32, 0x20, 0x9800}, {&(0x7f0000010e00)="004e535230320100"/32, 0x20, 0xa000}, {&(0x7f0000010f00)="0054454130310100"/32, 0x20, 0xa800}, {&(0x7f0000011000)="010002007c000000d890f001200000000000000000000000084344524f4d000000000000000000000000000000000000000000000000000601000100020002000100000001000000083546363732343232303030303132454500000000000000", 0x60, 0x10000}, {&(0x7f0000011100)="0000000000000011004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f6465", 0x60, 0x100c0}, {&(0x7f0000011200)="0000000000000000000000000000000000000000000000007810e40709140b2a3a000000002a67656e69736f696d61676500"/64, 0x40, 0x10160}, {&(0x7f0000011300)="04000200e60000001faff0012100000001000000002a554446204c5620496e666f00000000000000000000000201000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084344524f4d000000000000", 0x80, 0x10800}, {&(0x7f0000011400)="000000000000000000000000000000000000000600"/32, 0x20, 0x108e0}, {&(0x7f0000011500)='\x00*genisoimage\x00'/32, 0x20, 0x10960}, {&(0x7f0000011600)="0500020062000000a8a0f001220000000200000001000000022b4e5352303200", 0x20, 0x11000}, {&(0x7f0000011700)="000000000000000000000000000000000000000000000000010000000101000022000000002a67656e69736f696d61676500"/64, 0x40, 0x110a0}, {&(0x7f0000011800)="060002004f0000006411ae012300000003000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084344524f4d000000000000", 0x60, 0x11800}, {&(0x7f0000011900)="000000000000000000000000000000000000000600080000002a4f5354412055444620436f6d706c69616e74000000000201030000000000001000000000000000000000000000000600000001000000002a67656e69736f696d616765000000", 0x60, 0x118c0}, {&(0x7f0000011a00)="0000000000000000000000000000000000100000400000000106010000000000", 0x20, 0x119a0}, {&(0x7f0000011b00)="07000200b10000006d0f0800240000000400"/32, 0x20, 0x12000}, {&(0x7f0000011c00)="08000200200000000000f0012500"/32, 0x20, 0x12800}, {&(0x7f0000011d00)="010002005d0000006fcaf001300000000000000000000000084344524f4d000000000000000000000000000000000000000000000000000601000100020002000100000001000000083546363732343232303030303133323500000000000000", 0x60, 0x18000}, {&(0x7f0000011e00)="0000000000000011004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f6465", 0x60, 0x180c0}, {&(0x7f0000011f00)="0000000000000000000000000000000000000000000000007810e40709140b2a3a000000002a67656e69736f696d61676500"/64, 0x40, 0x18160}, {&(0x7f0000012000)="04000200f60000001faff0013100000001000000002a554446204c5620496e666f00000000000000000000000201000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084344524f4d000000000000", 0x80, 0x18800}, {&(0x7f0000012100)="000000000000000000000000000000000000000600"/32, 0x20, 0x188e0}, {&(0x7f0000012200)='\x00*genisoimage\x00'/32, 0x20, 0x18960}, {&(0x7f0000012300)="0500020072000000a8a0f001320000000200000001000000022b4e5352303200", 0x20, 0x19000}, {&(0x7f0000012400)="000000000000000000000000000000000000000000000000010000000101000022000000002a67656e69736f696d61676500"/64, 0x40, 0x190a0}, {&(0x7f0000012500)="060002005f0000006411ae013300000003000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084344524f4d000000000000", 0x60, 0x19800}, {&(0x7f0000012600)="000000000000000000000000000000000000000600080000002a4f5354412055444620436f6d706c69616e74000000000201030000000000001000000000000000000000000000000600000001000000002a67656e69736f696d616765000000", 0x60, 0x198c0}, {&(0x7f0000012700)="0000000000000000000000000000000000100000400000000106010000000000", 0x20, 0x199a0}, {&(0x7f0000012800)="07000200c10000006d0f0800340000000400"/32, 0x20, 0x1a000}, {&(0x7f0000012900)="08000200300000000000f0013500"/32, 0x20, 0x1a800}, {&(0x7f0000012a00)="09000200dc00000082997600400000007810e40709140b2a3a0000000100000000000000000000000d01000000000000000000000000000000000000000000000000000000000000010000002e0000000000000022000000002a67656e69736f696d61676500000000000000000000000000000000000000060000000200000002010201020100"/160, 0xa0, 0x20000}, {&(0x7f0000012b00)="080002003c0000000000f0014100"/32, 0x20, 0x20800}, {&(0x7f0000012c00)="02000200ce00000001d7f0010001000000800000200000000080000030000000", 0x20, 0x80000}, {&(0x7f0000012d00)="0001020032000000e559f001000000007810e40709140b2a3a0000000300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084344524f4d00"/128, 0x80, 0x80800}, {&(0x7f0000012e00)="00000000000000000000000000000006004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084344524f4d000000000000000000000000000000000000000000000000000600"/128, 0x80, 0x808e0}, {&(0x7f0000012f00)="0000000000000000000000000000000000080000020000000000000000000000002a4f5354412055444620436f6d706c69616e74000000000201030000000000", 0x40, 0x80980}, {&(0x7f0000013000)="08000200fc0000000000f0010100"/32, 0x20, 0x81000}, {&(0x7f0000013100)="050102008e0000007c60a8000200000000000000040000000100000400000000000030020000000000000000a51400000200000000000000080100000000000001000000000000007810e40709140b2a3a0000007810e40709140b2a3a0000007810e40709140b2a3a0000000100000000000000000000000000000000000000002a67656e69736f696d6167650000000000000000000000000000000000000000000000000000000000000008000000080100000300"/192, 0xc0, 0x81800}, {&(0x7f0000013200)="01010200c8000000476218000300000001000a00000800000200000000000000000000000000000001010200ef00000037912000030000000100000a0008000006000000000000000701000000000866696c652e636f6c640101020092000000c9a61c0003000000010002060008000004000000000000000501000000000866696c653001010200af000000d7b51c0003000000010000060008000007000000000000000801000000000866696c6531010102003700000061b31c0003000000010000060008000008000000000000000901000000000866696c653201010200220000006c931c0003000000010000060008000009000000000000000a01000000000866696c653300"/288, 0x120, 0x82000}, {&(0x7f0000013400)="0501020065000000a50ca8000400000000000000040000000100000400000000000030020000000000000000a51400000100000000000000800000000000000001000000000000007810e40709140b2a3a0000007810e40709140b2a3a0000007810e40709140b2a3a0000000100000000000000000000000000000000000000002a67656e69736f696d6167650000000000000000000000000000000000000005010000000000000000000008000000800000000500"/192, 0xc0, 0x82800}, {&(0x7f0000013500)="01010200ca000000476218000500000001000a00000800000200000000000000000000000000000001010200d2000000affe1c000500000001000006000800000a000000000000000b01000000000866696c6530010102006e00000076d31c000500000001000006000800000b000000000000000c01000000000866696c6531", 0x80, 0x83000}, {&(0x7f0000013600)="050102009d00000045a2a8000600000000000000040000000100000500000000000030020000000000000000841000000100000000000000640000000000000001000000000000007810e40709140b2a3a0000007810e40709140b2a3a0000007810e40709140b2a3a0000000100000000000000000000000000000000000000002a67656e69736f696d6167650000000000000000000000000000000000000007010000000000000000000008000000640000001900"/192, 0xc0, 0x83800}, {&(0x7f0000013700)="0501020028000000442da80007000000000000000400000001000005000000000000300200000000000000008410000001000000000000000a0000000000000001000000000000007810e40709140b2a3a0000007810e40709140b2a3a0000007810e40709140b2a3a0000000100000000000000000000000000000000000000002a67656e69736f696d61676500000000000000000000000000000000000000080100000000000000000000080000000a0000001a00"/192, 0xc0, 0x84000}, {&(0x7f0000013800)="05010200010000002524a8000800000000000000040000000100000500000000000030020000000000000000841000000100000000000000282300000000000005000000000000007810e40709140b2a3a0000007810e40709140b2a3a0000007810e40709140b2a3a0000000100000000000000000000000000000000000000002a67656e69736f696d6167650000000000000000000000000000000000000009010000000000000000000008000000282300001b00"/192, 0xc0, 0x84800}, {&(0x7f0000013900)="0501020056000000207da8000900000000000000040000000100000500000000000030020000000000000000841000000100000000000000282300000000000005000000000000007810e40709140b2a3a0000007810e40709140b2a3a0000007810e40709140b2a3a0000000100000000000000000000000000000000000000002a67656e69736f696d616765000000000000000000000000000000000000000a010000000000000000000008000000282300001b00"/192, 0xc0, 0x85000}, {&(0x7f0000013a00)="050102008100000018afa8000a000000000000000400000001000005000000000000300200000000000000008410000001000000000000001a0400000000000001000000000000007810e40709140b2a3a0000007810e40709140b2a3a0000007810e40709140b2a3a0000000100000000000000000000000000000000000000002a67656e69736f696d616765000000000000000000000000000000000000000b0100000000000000000000080000001a0400002000"/192, 0xc0, 0x85800}, {&(0x7f0000013b00)="0501020039000000f690a0000b00000000000000040000000100000500000000000030020000000000000000841000000100000000000000000000000000000000000000000000007810e40709140b2a3a0000007810e40709140b2a3a0000007810e40709140b2a3a0000000100000000000000000000000000000000000000002a67656e69736f696d616765000000000000000000000000000000000000000c0100"/192, 0xc0, 0x86000}, {&(0x7f0000013c00)="01001501000001000000050016010000010046494c4530000000000000000000", 0x20, 0x86800}, {&(0x7f0000013d00)="01000000011500010000050000000116000146494c4530000000000000000000", 0x20, 0x87800}, {&(0x7f0000013e00)="010017010000010000000a0018010000010000660069006c0065003000000000", 0x20, 0x88800}, {&(0x7f0000013f00)="010000000117000100000a0000000118000100660069006c0065003000000000", 0x20, 0x89800}, {&(0x7f0000014000)="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", 0x380, 0x8a800}, {&(0x7f0000014400)="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", 0x200, 0x8b000}, {&(0x7f0000014600)="2200170100000000011700080000000008007809140b2a3a080200000100000101002200170100000000011700080000000008007809140b2a3a0802000001000001010134001a0100000000011a64000000000000647809140b2a3a08000000010000011200660069006c0065002e0063006f006c0064002c00180100000000011800080000000008007809140b2a3a08020000010000010a00660069006c00650030002c001b0100000000011b0a0000000000000a7809140b2a3a08000000010000010a00660069006c00650031002c001c0100000000011c28230000000023287809140b2a3a08000000010000010a00660069006c00650032002c001c0100000000011c28230000000023287809140b2a3a08000000010000010a00660069006c0065003300"/320, 0x140, 0x8b800}, {&(0x7f0000014800)="2200180100000000011800080000000008007809140b2a3a080200000100000101002200170100000000011700080000000008007809140b2a3a080200000100000101012c0021010000000001211a0400000000041a7809140b2a3a08000000010000010a00660069006c00650030002c00220100000000012200000000000000007809140b2a3a08000000010000010a00660069006c006500310000000000", 0xa0, 0x8c000}, {&(0x7f0000014900)="4552ed010a548701525249505f313939314154484520524f434b20524944474520494e5445524348414e47452050524f544f434f4c2050524f564944455320535550504f525420464f5220504f5349582046494c452053595354454d2053454d414e54494353504c4541534520434f4e544143542044495343205055424c495348455220464f522053504543494649434154494f4e20534f555243452e2020534545205055424c4953484552204944454e54494649455220494e205052494d41525920564f4c554d452044455343524950544f5220464f5220434f4e5441435420494e464f524d4154494f4e2e00"/256, 0x100, 0x8c800}, {&(0x7f0000014a00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x8d000}, {&(0x7f0000014b00)='syzkallers\x00'/32, 0x20, 0x8d800}, {&(0x7f0000014c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x90800}, {&(0x7f0000015100)="02000200f000000001d7f0012201000000800000200000000080000030000000", 0x20, 0x91000}, {&(0x7f0000015200)="02000200f100000001d7f0012301000000800000200000000080000030000000", 0x20, 0x91800}, {&(0x7f0000015300)="02000200f200000001d7f0012401000000800000200000000080000030000000", 0x20, 0x92000}, {&(0x7f0000015400)="02000200f300000001d7f0012501000000800000200000000080000030000000", 0x20, 0x92800}, {&(0x7f0000015500)="02000200f400000001d7f0012601000000800000200000000080000030000000", 0x20, 0x93000}, {&(0x7f0000015600)="02000200f500000001d7f0012701000000800000200000000080000030000000", 0x20, 0x93800}, {&(0x7f0000015700)="02000200f600000001d7f0012801000000800000200000000080000030000000", 0x20, 0x94000}, {&(0x7f0000015800)="02000200f700000001d7f0012901000000800000200000000080000030000000", 0x20, 0x94800}, {&(0x7f0000015900)="02000200f800000001d7f0012a01000000800000200000000080000030000000", 0x20, 0x95000}, {&(0x7f0000015a00)="02000200f900000001d7f0012b01000000800000200000000080000030000000", 0x20, 0x95800}, {&(0x7f0000015b00)="02000200fa00000001d7f0012c01000000800000200000000080000030000000", 0x20, 0x96000}, {&(0x7f0000015c00)="02000200fb00000001d7f0012d01000000800000200000000080000030000000", 0x20, 0x96800}, {&(0x7f0000015d00)="02000200fc00000001d7f0012e01000000800000200000000080000030000000", 0x20, 0x97000}, {&(0x7f0000015e00)="02000200fd00000001d7f0012f01000000800000200000000080000030000000", 0x20, 0x97800}, {&(0x7f0000015f00)="02000200fe00000001d7f0013001000000800000200000000080000030000000", 0x20, 0x98000}, {&(0x7f0000016000)="02000200ff00000001d7f0013101000000800000200000000080000030000000", 0x20, 0x98800}, {&(0x7f0000016100)="020002000000000001d7f0013201000000800000200000000080000030000000", 0x20, 0x99000}, {&(0x7f0000016200)="020002000100000001d7f0013301000000800000200000000080000030000000", 0x20, 0x99800}, {&(0x7f0000016300)="020002000200000001d7f0013401000000800000200000000080000030000000", 0x20, 0x9a000}, {&(0x7f0000016400)="020002000300000001d7f0013501000000800000200000000080000030000000", 0x20, 0x9a800}, {&(0x7f0000016500)="020002000400000001d7f0013601000000800000200000000080000030000000", 0x20, 0x9b000}, {&(0x7f0000016600)="020002000500000001d7f0013701000000800000200000000080000030000000", 0x20, 0x9b800}, {&(0x7f0000016700)="020002000600000001d7f0013801000000800000200000000080000030000000", 0x20, 0x9c000}, {&(0x7f0000016800)="020002000700000001d7f0013901000000800000200000000080000030000000", 0x20, 0x9c800}, {&(0x7f0000016900)="020002000800000001d7f0013a01000000800000200000000080000030000000", 0x20, 0x9d000}, {&(0x7f0000016a00)="020002000900000001d7f0013b01000000800000200000000080000030000000", 0x20, 0x9d800}, {&(0x7f0000016b00)="020002000a00000001d7f0013c01000000800000200000000080000030000000", 0x20, 0x9e000}, {&(0x7f0000016c00)="020002000b00000001d7f0013d01000000800000200000000080000030000000", 0x20, 0x9e800}, {&(0x7f0000000040)="020002000c00000001d7f0013e01000000800000200000000080000030000000c01730835935f30984", 0x29, 0x9f000}, {&(0x7f0000016e00)="020002000d00000001d7f0013f01000000800000200000000080000030000000", 0x20, 0x9f800}, {&(0x7f0000016f00)="020002000e00000001d7f0014001000000800000200000000080000030000000", 0x20, 0xa0000}, {&(0x7f0000017000)="020002000f00000001d7f0014101000000800000200000000080000030000000", 0x20, 0xa0800}, {&(0x7f0000017100)="020002001000000001d7f0014201000000800000200000000080000030000000", 0x20, 0xa1000}, {&(0x7f0000017200)="020002001100000001d7f0014301000000800000200000000080000030000000", 0x20, 0xa1800}, {&(0x7f0000017300)="020002001200000001d7f0014401000000800000200000000080000030000000", 0x20, 0xa2000}, {&(0x7f0000017400)="020002001300000001d7f0014501000000800000200000000080000030000000", 0x20, 0xa2800}, {&(0x7f0000017500)="020002001400000001d7f0014601000000800000200000000080000030000000", 0x20, 0xa3000}, {&(0x7f0000017600)="020002001500000001d7f0014701000000800000200000000080000030000000", 0x20, 0xa3800}, {&(0x7f0000017700)="020002001600000001d7f0014801000000800000200000000080000030000000", 0x20, 0xa4000}, {&(0x7f0000017800)="020002001700000001d7f0014901000000800000200000000080000030000000", 0x20, 0xa4800}, {&(0x7f0000017900)="020002001800000001d7f0014a01000000800000200000000080000030000000", 0x20, 0xa5000}, {&(0x7f0000017a00)="020002001900000001d7f0014b01000000800000200000000080000030000000", 0x20, 0xa5800}, {&(0x7f0000017b00)="020002001a00000001d7f0014c01000000800000200000000080000030000000", 0x20, 0xa6000}, {&(0x7f0000017c00)="020002001b00000001d7f0014d01000000800000200000000080000030000000", 0x20, 0xa6800}, {&(0x7f0000017d00)="020002001c00000001d7f0014e01000000800000200000000080000030000000", 0x20, 0xa7000}, {&(0x7f0000017e00)="020002001d00000001d7f0014f01000000800000200000000080000030000000", 0x20, 0xa7800}, {&(0x7f0000017f00)="020002001e00000001d7f0015001000000800000200000000080000030000000", 0x20, 0xa8000}, {&(0x7f0000018000)="020002001f00000001d7f0015101000000800000200000000080000030000000", 0x20, 0xa8800}, {&(0x7f0000018100)="020002002000000001d7f0015201000000800000200000000080000030000000", 0x20, 0xa9000}, {&(0x7f0000018200)="020002002100000001d7f0015301000000800000200000000080000030000000", 0x20, 0xa9800}, {&(0x7f0000018300)="020002002200000001d7f0015401000000800000200000000080000030000000", 0x20, 0xaa000}, {&(0x7f0000018400)="020002002300000001d7f0015501000000800000200000000080000030000000", 0x20, 0xaa800}, {&(0x7f0000018500)="020002002400000001d7f0015601000000800000200000000080000030000000", 0x20, 0xab000}, {&(0x7f0000018600)="020002002500000001d7f0015701000000800000200000000080000030000000", 0x20, 0xab800}, {&(0x7f0000018700)="020002002600000001d7f0015801000000800000200000000080000030000000", 0x20, 0xac000}, {&(0x7f0000018800)="020002002700000001d7f0015901000000800000200000000080000030000000", 0x20, 0xac800}, {&(0x7f0000018900)="020002002800000001d7f0015a01000000800000200000000080000030000000", 0x20, 0xad000}, {&(0x7f0000018a00)="020002002900000001d7f0015b01000000800000200000000080000030000000", 0x20, 0xad800}, {&(0x7f0000018b00)="020002002a00000001d7f0015c01000000800000200000000080000030000000", 0x20, 0xae000}, {&(0x7f0000018c00)="020002002b00000001d7f0015d01000000800000200000000080000030000000", 0x20, 0xae800}, {&(0x7f0000018d00)="020002002c00000001d7f0015e01000000800000200000000080000030000000", 0x20, 0xaf000}, {&(0x7f0000018e00)="020002002d00000001d7f0015f01000000800000200000000080000030000000", 0x20, 0xaf800}, {&(0x7f0000018f00)="020002002e00000001d7f0016001000000800000200000000080000030000000", 0x20, 0xb0000}, {&(0x7f0000019000)="020002002f00000001d7f0016101000000800000200000000080000030000000", 0x20, 0xb0800}, {&(0x7f0000019100)="020002003000000001d7f0016201000000800000200000000080000030000000", 0x20, 0xb1000}, {&(0x7f0000019200)="020002003100000001d7f0016301000000800000200000000080000030000000", 0x20, 0xb1800}, {&(0x7f0000019300)="020002003200000001d7f0016401000000800000200000000080000030000000", 0x20, 0xb2000}, {&(0x7f0000019400)="020002003300000001d7f0016501000000800000200000000080000030000000", 0x20, 0xb2800}, {&(0x7f0000019500)="020002003400000001d7f0016601000000800000200000000080000030000000", 0x20, 0xb3000}, {&(0x7f0000019600)="020002003500000001d7f0016701000000800000200000000080000030000000", 0x20, 0xb3800}, {&(0x7f0000019700)="020002003600000001d7f0016801000000800000200000000080000030000000", 0x20, 0xb4000}, {&(0x7f0000019800)="020002003700000001d7f0016901000000800000200000000080000030000000", 0x20, 0xb4800}, {&(0x7f0000019900)="020002003800000001d7f0016a01000000800000200000000080000030000000", 0x20, 0xb5000}, {&(0x7f0000019a00)="020002003900000001d7f0016b01000000800000200000000080000030000000", 0x20, 0xb5800}, {&(0x7f0000019b00)="020002003a00000001d7f0016c01000000800000200000000080000030000000", 0x20, 0xb6000}, {&(0x7f0000019c00)="020002003b00000001d7f0016d01000000800000200000000080000030000000", 0x20, 0xb6800}, {&(0x7f0000019d00)="020002003c00000001d7f0016e01000000800000200000000080000030000000", 0x20, 0xb7000}, {&(0x7f0000019e00)="020002003d00000001d7f0016f01000000800000200000000080000030000000", 0x20, 0xb7800}, {&(0x7f0000019f00)="020002003e00000001d7f0017001000000800000200000000080000030000000", 0x20, 0xb8000}, {&(0x7f000001a000)="020002003f00000001d7f0017101000000800000200000000080000030000000", 0x20, 0xb8800}, {&(0x7f000001a100)="020002004000000001d7f0017201000000800000200000000080000030000000", 0x20, 0xb9000}, {&(0x7f000001a200)="020002004100000001d7f0017301000000800000200000000080000030000000", 0x20, 0xb9800}, {&(0x7f000001a300)="020002004200000001d7f0017401000000800000200000000080000030000000", 0x20, 0xba000}, {&(0x7f000001a400)="020002004300000001d7f0017501000000800000200000000080000030000000", 0x20, 0xba800}, {&(0x7f000001a500)="020002004400000001d7f0017601000000800000200000000080000030000000", 0x20, 0xbb000}, {&(0x7f000001a600)="020002004500000001d7f0017701000000800000200000000080000030000000", 0x20, 0xbb800}, {&(0x7f000001a700)="020002004600000001d7f0017801000000800000200000000080000030000000", 0x20, 0xbc000}, {&(0x7f000001a800)="020002004700000001d7f0017901000000800000200000000080000030000000", 0x20, 0xbc800}, {&(0x7f000001a900)="020002004800000001d7f0017a01000000800000200000000080000030000000", 0x20, 0xbd000}, {&(0x7f000001aa00)="020002004900000001d7f0017b01000000800000200000000080000030000000", 0x20, 0xbd800}, {&(0x7f000001ab00)="020002004a00000001d7f0017c01000000800000200000000080000030000000", 0x20, 0xbe000}, {&(0x7f000001ac00)="020002004b00000001d7f0017d01000000800000200000000080000030000000", 0x20, 0xbe800}, {&(0x7f000001ad00)="020002004c00000001d7f0017e01000000800000200000000080000030000000", 0x20, 0xbf000}, {&(0x7f000001ae00)="020002004d00000001d7f0017f01000000800000200000000080000030000000", 0x20, 0xbf800}, {&(0x7f000001af00)="020002004e00000001d7f0018001000000800000200000000080000030000000", 0x20, 0xc0000}, {&(0x7f000001b000)="020002004f00000001d7f0018101000000800000200000000080000030000000", 0x20, 0xc0800}, {&(0x7f000001b100)="020002005000000001d7f0018201000000800000200000000080000030000000", 0x20, 0xc1000}, {&(0x7f000001b200)="020002005100000001d7f0018301000000800000200000000080000030000000", 0x20, 0xc1800}, {&(0x7f000001b300)="020002005200000001d7f0018401000000800000200000000080000030000000", 0x20, 0xc2000}, {&(0x7f000001b400)="020002005300000001d7f0018501000000800000200000000080000030000000", 0x20, 0xc2800}, {&(0x7f000001b500)="020002005400000001d7f0018601000000800000200000000080000030000000", 0x20, 0xc3000}, {&(0x7f000001b600)="020002005500000001d7f0018701000000800000200000000080000030000000", 0x20, 0xc3800}, {&(0x7f000001b700)="020002005600000001d7f0018801000000800000200000000080000030000000", 0x20, 0xc4000}, {&(0x7f000001b800)="020002005700000001d7f0018901000000800000200000000080000030000000", 0x20, 0xc4800}, {&(0x7f000001b900)="020002005800000001d7f0018a01000000800000200000000080000030000000", 0x20, 0xc5000}, {&(0x7f000001ba00)="020002005900000001d7f0018b01000000800000200000000080000030000000", 0x20, 0xc5800}, {&(0x7f000001bb00)="020002005a00000001d7f0018c01000000800000200000000080000030000000", 0x20, 0xc6000}, {&(0x7f000001bc00)="020002005b00000001d7f0018d01000000800000200000000080000030000000", 0x20, 0xc6800}, {&(0x7f000001bd00)="020002005c00000001d7f0018e01000000800000200000000080000030000000", 0x20, 0xc7000}, {&(0x7f000001be00)="020002005d00000001d7f0018f01000000800000200000000080000030000000", 0x20, 0xc7800}, {&(0x7f000001bf00)="020002005e00000001d7f0019001000000800000200000000080000030000000", 0x20, 0xc8000}, {&(0x7f000001c000)="020002005f00000001d7f0019101000000800000200000000080000030000000", 0x20, 0xc8800}, {&(0x7f000001c100)="020002006000000001d7f0019201000000800000200000000080000030000000", 0x20, 0xc9000}, {&(0x7f000001c200)="020002006100000001d7f0019301000000800000200000000080000030000000", 0x20, 0xc9800}, {&(0x7f000001c300)="020002006200000001d7f0019401000000800000200000000080000030000000", 0x20, 0xca000}, {&(0x7f000001c400)="020002006300000001d7f0019501000000800000200000000080000030000000", 0x20, 0xca800}, {&(0x7f000001c500)="020002006400000001d7f0019601000000800000200000000080000030000000", 0x20, 0xcb000}, {&(0x7f000001c600)="020002006500000001d7f0019701000000800000200000000080000030000000", 0x20, 0xcb800}, {&(0x7f000001c700)="020002006600000001d7f0019801000000800000200000000080000030000000", 0x20, 0xcc000}, {&(0x7f000001c800)="020002006700000001d7f0019901000000800000200000000080000030000000", 0x20, 0xcc800}, {&(0x7f000001c900)="020002006800000001d7f0019a01000000800000200000000080000030000000", 0x20, 0xcd000}, {&(0x7f000001ca00)="020002006900000001d7f0019b01000000800000200000000080000030000000", 0x20, 0xcd800}, {&(0x7f000001cb00)="020002006a00000001d7f0019c01000000800000200000000080000030000000", 0x20, 0xce000}, {&(0x7f000001cc00)="020002006b00000001d7f0019d01000000800000200000000080000030000000", 0x20, 0xce800}, {&(0x7f000001cd00)="020002006c00000001d7f0019e01000000800000200000000080000030000000", 0x20, 0xcf000}, {&(0x7f000001ce00)="020002006d00000001d7f0019f01000000800000200000000080000030000000", 0x20, 0xcf800}, {&(0x7f000001cf00)="020002006e00000001d7f001a001000000800000200000000080000030000000", 0x20, 0xd0000}, {&(0x7f000001d000)="020002006f00000001d7f001a101000000800000200000000080000030000000", 0x20, 0xd0800}, {&(0x7f000001d100)="020002007000000001d7f001a201000000800000200000000080000030000000", 0x20, 0xd1000}, {&(0x7f000001d200)="020002007100000001d7f001a301000000800000200000000080000030000000", 0x20, 0xd1800}, {&(0x7f000001d300)="020002007200000001d7f001a401000000800000200000000080000030000000", 0x20, 0xd2000}, {&(0x7f000001d400)="020002007300000001d7f001a501000000800000200000000080000030000000", 0x20, 0xd2800}, {&(0x7f000001d500)="020002007400000001d7f001a601000000800000200000000080000030000000", 0x20, 0xd3000}, {&(0x7f000001d600)="020002007500000001d7f001a701000000800000200000000080000030000000", 0x20, 0xd3800}, {&(0x7f000001d700)="020002007600000001d7f001a801000000800000200000000080000030000000", 0x20, 0xd4000}, {&(0x7f000001d800)="020002007700000001d7f001a901000000800000200000000080000030000000", 0x20, 0xd4800}, {&(0x7f000001d900)="020002007800000001d7f001aa01000000800000200000000080000030000000", 0x20, 0xd5000}, {&(0x7f000001da00)="020002007900000001d7f001ab01000000800000200000000080000030000000", 0x20, 0xd5800}, {&(0x7f000001db00)="020002007a00000001d7f001ac01000000800000200000000080000030000000", 0x20, 0xd6000}, {&(0x7f000001dc00)="020002007b00000001d7f001ad01000000800000200000000080000030000000", 0x20, 0xd6800}, {&(0x7f000001dd00)="020002007c00000001d7f001ae01000000800000200000000080000030000000", 0x20, 0xd7000}, {&(0x7f000001de00)="020002007d00000001d7f001af01000000800000200000000080000030000000", 0x20, 0xd7800}, {&(0x7f000001df00)="020002007e00000001d7f001b001000000800000200000000080000030000000", 0x20, 0xd8000}, {&(0x7f000001e000)="020002007f00000001d7f001b101000000800000200000000080000030000000", 0x20, 0xd8800}, {&(0x7f000001e100)="020002008000000001d7f001b201000000800000200000000080000030000000", 0x20, 0xd9000}, {&(0x7f000001e200)="020002008100000001d7f001b301000000800000200000000080000030000000", 0x20, 0xd9800}, {&(0x7f000001e300)="020002008200000001d7f001b401000000800000200000000080000030000000", 0x20, 0xda000}, {&(0x7f000001e400)="020002008300000001d7f001b501000000800000200000000080000030000000", 0x20, 0xda800}, {&(0x7f000001e500)="020002008400000001d7f001b601000000800000200000000080000030000000", 0x20, 0xdb000}, {&(0x7f000001e600)="020002008500000001d7f001b701000000800000200000000080000030000000", 0x20, 0xdb800}, {&(0x7f000001e700)="020002008600000001d7f001b801000000800000200000000080000030000000", 0x20, 0xdc000}], 0x0, &(0x7f000001e800)) openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x204040, 0x98, 0xc}, 0x18) 06:27:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390020006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3492.391215][T20172] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3492.419560][T20178] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.4'. 06:27:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002000034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3492.482842][T20185] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.4'. 06:27:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390025006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002100034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(0x0, 0x0) 06:27:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007700034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000), 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x74, 0xd9f, 0x0) r3 = socket(0xf, 0x40804, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, &(0x7f00000009c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000bc0)={{}, r4, 0x0, @unused=[0x3f, 0x40, 0x7, 0xfffffffffffffffc], @subvolid}) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000280)=r4) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f0000000340)={@mcast2, @mcast1, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40402ba}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@loopback, 0x0, r5}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) r7 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r7, &(0x7f00000009c0), 0xd4ba0ff) dup2(r0, r7) splice(r7, &(0x7f0000000000)=0x3, r6, &(0x7f0000000080), 0x7, 0x0) 06:27:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39a834006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3492.639259][T20214] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=20214 comm=syz-executor.4 [ 3492.661103][T20217] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=20217 comm=syz-executor.4 06:27:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x15, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d6f4655fd6f4655f0100ffff53ef010001000000d5f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e34393038313534303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000028305c8a835f4f4da440baa59e2884cb010040000c00000000000000d5f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000005a00000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000019000f0003000400"/32, 0x20, 0x1000}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d5f4655fd5f4655fd5f4655f00"/8224, 0x2020, 0x2000}, {&(0x7f0000012500)="ed41000000100000d5f4655fd6f4655fd6f4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x4100}, {&(0x7f0000012600)="200000003413ec503413ec5000000000d5f4655f00"/32, 0x20, 0x4180}, {&(0x7f0000012700)="8081000000c04000d5f4655fd5f4655fd5f4655f00000000000001008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000010000000000000000000000000000000000000020000000000000000000000000000000d5f4655f00"/160, 0xa0, 0x4600}, {&(0x7f0000012800)="c041000000300000d5f4655fd5f4655fd5f4655f00000000000002008000000000000800000000000af301000400000000000000000000000300000020000000", 0x40, 0x4a00}, {&(0x7f0000012900)="20000000000000000000000000000000d5f4655f000000000000000000000000000002ea00"/64, 0x40, 0x4a80}, {&(0x7f0000012a00)="ed4100003c000000d6f4655fd6f4655fd6f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c65310000000000000000000000000000000000000000000000000000003ba2b893000000000000000000000000000000000000000000000000200000003413ec503413ec503413ec50d6f4655f3413ec500000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x4b00}, {&(0x7f0000012b00)="ed8100001a040000d6f4655fd6f4655fd6f4655f00000000000001008000000000000800010000000af301000400000000000000000000000100000050000000000000000000000000000000000000000000000000000000000000000000000000000000c37da192000000000000000000000000000000000000000000000000200000003413ec503413ec503413ec50d6f4655f3413ec500000000000000000", 0xa0, 0x4c00}, {&(0x7f0000012c00)="ffa1000026000000d6f4655fd6f4655fd6f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3439303831353430342f66696c65302f66696c653000000000000000000000000000000000000000000000da927999000000000000000000000000000000000000000000000000200000003413ec503413ec503413ec50d6f4655f3413ec500000000000000000", 0xa0, 0x4d00}, {&(0x7f0000012d00)="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", 0x1a0, 0x4e00}, {&(0x7f0000012f00)="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", 0x100, 0x5000}, {&(0x7f0000013000)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c653300000011000000940f090166696c652e636f6c64000000", 0x80, 0x10000}, {&(0x7f0000013100)="0b0000000c0001022e000000020000000c0002022e2e000000000000e80f0000", 0x20, 0x20000}, {&(0x7f0000013200)="00000000001000"/32, 0x20, 0x21000}, {&(0x7f0000013300)="00000000001000"/32, 0x20, 0x22000}, {&(0x7f0000013400)="504d4d00504d4dffd6f4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033350075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x40000}, {&(0x7f0000013500)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x50000}], 0x0, &(0x7f0000013a00)) open(&(0x7f0000000040)='./file0\x00', 0x80403, 0x40) symlink(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file0\x00') 06:27:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(0x0, 0x0) 06:27:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002200034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390048006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000000500034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:27 executing program 0: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000003c0)={0x0}) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000340)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000010ffd}], 0x0, &(0x7f0000000180)=ANY=[@ANYRES32=r0]) chdir(&(0x7f00000000c0)='./file0\x00') r1 = open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x10) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) r4 = pidfd_getfd(r1, r3, 0x0) write$cgroup_type(r4, &(0x7f00000009c0), 0x9) getsockname(r3, &(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, &(0x7f0000000140)=0x80) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) r6 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000000)='cpu&\n\n-0\x00\x00\x00\xc8 \xf4\xb3\xca\f\x90|\x1ff\xf0\xd2\x9ba\xdd\xba\x93\xf3\xa2\x97e\xd7\xa37\xc0\xae$\xef\x1f\x1feq*\xeb\x00\xffx\x7fV-W\xeb\x9c\xf5\xe5!d\x99]\x17~\x9e\\\xac\x1f\x93\x00\x00\x00\x80T\"\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) unlink(&(0x7f0000000100)='./file0\x00') preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r5, r2, 0x0, 0xa198) 06:27:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39004c006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(0x0, 0x0) 06:27:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3493.853038][T20230] validate_nla: 31 callbacks suppressed [ 3493.853050][T20230] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000002140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffef8}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') preadv(r1, &(0x7f0000000040)=[{&(0x7f0000001400)=""/111, 0x6f}], 0x1, 0x0, 0x0) readlinkat(r1, &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000001c0)=""/165, 0xa5) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) symlink(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)='./bus\x00') r3 = creat(&(0x7f0000000280)='./bus\x00', 0x20) ioctl$MON_IOCQ_RING_SIZE(r3, 0x9205) r4 = open(&(0x7f0000000180)='./bus\x00', 0x1eb142, 0x0) close(r0) copy_file_range(r2, 0x0, r4, 0x0, 0x0, 0x0) [ 3493.906426][T20240] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pid=20240 comm=syz-executor.4 [ 3493.926137][T20246] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3493.930210][T20240] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pid=20240 comm=syz-executor.4 [ 3493.938150][T20230] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390060006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000000800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:28 executing program 5: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x14c, 0x0, 0x10, 0x70bd2d, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r0}, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x21, 0x13, [{0x36}, {0x6c}, {0x60, 0x1}, {0x16, 0x1}, {0xc, 0x1}, {0x4}, {0x4, 0x1}, {0x30, 0x1}, {0x30}, {0x9, 0x1}, {0xb}, {0x9, 0x1}, {0x6c, 0x1}, {0x16}, {0x18}, {0x16}, {0x18, 0x1}, {0x48, 0x1}, {0x12, 0x1}, {0x18, 0x1}, {0x2, 0x1}, {0x6c, 0x1}, {0x2, 0x1}, {0x4}, {0x18}, {0x2}, {0xb, 0x1}, {}, {0x0, 0x1}]}, @NL80211_ATTR_VLAN_ID={0x6, 0x11a, 0x1}, @NL80211_ATTR_VLAN_ID={0x6, 0x11a, 0x3}, @NL80211_ATTR_STA_WME={0x24, 0x81, [@NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x7}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x42}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x8}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x81}]}, @NL80211_ATTR_STA_EXT_CAPABILITY={0xd6, 0xac, "feae841210bcf34a460373dc08402bf17449f635902d7e2b1252670f912a570c6dc1535eaf88b12148b005938fbe8b07bdc13df2c9e5fb8b462ce3756e0b238c8d3348ed5d36e859ab4931d9f4ad9c72bbc89ef644a68b2dee5f9b519bf0d4cecbab6b366656c1cc6a47e5289fe545baf318be16fe96ab681824e28c5fc8454ed82c1217cd9ccfc6de4673346476e3497d60b5d1f56bbcaea2b28eed26f1d5b0982497745ade6894f4670ecd736bc33f6fd0d1034f11ef13dd83a63b8d14006d20fdb4b6b630a4b0067d4dbf39b7b978accc"}]}, 0x14c}, 0x1, 0x0, 0x0, 0x40}, 0x40000) set_mempolicy(0x3, &(0x7f00000000c0)=0x9, 0x9) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='!pu<-0\n&Xp\x9c\xe8|\bB\xe0|') 06:27:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002500034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3494.044262][T20264] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390068006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3494.093825][T20264] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=20264 comm=syz-executor.4 [ 3494.119305][T20264] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3494.130361][T20272] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3494.137934][T20273] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=20273 comm=syz-executor.4 06:27:28 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) close(r2) close(r1) r3 = socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="1c0000002200", 0x6) splice(r0, 0x0, r1, 0x0, 0xffff, 0x0) write$tcp_mem(r1, &(0x7f0000000300)={0x4, 0x20, 0x371, 0x20, 0x9}, 0x48) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r3) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x110, r4, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKMODES_OURS={0xfc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x65, 0x5, "1431cb5fa62bbab489222168b366a529d1ab9fe819918fd4598ca4430c0804f9cd8069040927f4d52199827c7db1067ea9bccc22c2490c346ecbc67e378ad953f0b3c56c3b05d08b160a21e02a6771326bc11e2d94fe0fa2d8103903380bb8dca0"}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '*-\'\\]\'\'-\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '},v/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x774}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x40008042}, 0x0) 06:27:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002600034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39006c006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:28 executing program 5: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000040)}, 0x10) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) sendfile(r1, r1, &(0x7f00000000c0)=0x7f, 0x7fffffff) sendfile(r0, r1, 0x0, 0x20000000005) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x3, 0x1, 0x9, 0x3}, {0x7, 0x1, 0x4, 0x9}]}) tkill(0x0, 0x14) 06:27:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000000900034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3494.467830][T20286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20286 comm=syz-executor.0 [ 3494.472699][T20291] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3494.491166][ T25] audit: type=1326 audit(1624602448.611:913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20279 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 06:27:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390074006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:28 executing program 2 (fault-call:3 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3494.510574][T20289] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3494.524886][T20292] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20292 comm=syz-executor.0 [ 3494.539145][T20295] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9 sclass=netlink_route_socket pid=20295 comm=syz-executor.4 [ 3494.556912][T20297] FAULT_INJECTION: forcing a failure. 06:27:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3494.556912][T20297] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3494.570097][T20297] CPU: 0 PID: 20297 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3494.580304][T20297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3494.590344][T20297] Call Trace: [ 3494.593614][T20297] dump_stack+0x137/0x19d [ 3494.597945][T20297] should_fail+0x23c/0x250 [ 3494.602359][T20297] should_fail_usercopy+0x16/0x20 [ 3494.607387][T20297] _copy_from_user+0x1c/0xd0 [ 3494.612029][T20297] copy_clone_args_from_user+0x133/0x420 06:27:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39007a006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3494.616460][T20300] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3494.617707][T20297] ? kstrtouint_from_user+0x104/0x130 [ 3494.632329][T20297] ? fsnotify_perm+0x59/0x2e0 [ 3494.637084][T20297] ? __fsnotify_parent+0x32f/0x430 [ 3494.637948][ T25] audit: type=1326 audit(1624602448.651:914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20279 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=54 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 3494.642212][T20297] ? get_pid_task+0x8b/0xc0 [ 3494.642230][T20297] __se_sys_clone3+0x4c/0x1d0 [ 3494.667265][ T25] audit: type=1326 audit(1624602448.651:915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20279 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 3494.670578][T20297] ? vfs_write+0x50c/0x770 [ 3494.670672][T20297] ? __fget_light+0x21b/0x260 06:27:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002900034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3494.703940][ T25] audit: type=1326 audit(1624602448.651:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20279 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 3494.708250][T20297] ? __cond_resched+0x11/0x40 [ 3494.708273][T20297] ? perf_trace_sys_exit+0x4d/0x160 [ 3494.733908][ T25] audit: type=1326 audit(1624602448.661:917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20279 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=222 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 3494.736966][T20297] ? fput+0x2d/0x130 [ 3494.736989][T20297] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3494.751054][ T25] audit: type=1326 audit(1624602448.661:918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20279 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 3494.766132][T20297] ? syscall_trace_enter+0x153/0x290 [ 3494.766156][T20297] ? exit_to_user_mode_prepare+0x65/0x190 06:27:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3494.799986][ T25] audit: type=1326 audit(1624602448.661:919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20279 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=257 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 3494.805426][T20297] __x64_sys_clone3+0x2d/0x40 [ 3494.805450][T20297] do_syscall_64+0x4a/0x90 [ 3494.819684][ T25] audit: type=1326 audit(1624602448.661:920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20279 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 3494.835060][T20297] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3494.850270][ T25] audit: type=1326 audit(1624602448.661:921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20279 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=223 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 3494.868237][T20297] RIP: 0033:0x4665d9 [ 3494.868255][T20297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3494.868272][T20297] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 [ 3494.908881][ T25] audit: type=1326 audit(1624602448.661:922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20279 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 3494.921498][T20297] ORIG_RAX: 00000000000001b3 [ 3494.921508][T20297] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3494.921522][T20297] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3494.921535][T20297] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3494.980142][T20297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3494.988120][T20297] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3495.002882][T20295] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9 sclass=netlink_route_socket pid=20295 comm=syz-executor.4 06:27:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x200, 0x29) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x8400, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="0000000004", 0x5, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012a00)="80", 0x1, 0x4c00}], 0x0, &(0x7f00000000c0)=ANY=[]) 06:27:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390200002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3934a8006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3495.009619][T20289] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006600034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:29 executing program 2 (fault-call:3 fault-nth:1): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000000a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390300002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:29 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0x2283, &(0x7f0000000000)) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000040)) 06:27:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000100)) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x109842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r1, 0xbff000) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) r3 = syz_open_dev$ptys(0xc, 0x3, 0x1) ftruncate(r0, 0x2007ffe) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001d00)={0x0, 0x0, 0x0}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x81, 0x0, 0x49, 0x7, 0x0, 0xffffffff, 0x4401, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x480, 0x84, 0x4, 0x2, 0x1, 0x2e2, 0x2, 0x0, 0x80, 0x0, 0x4}, 0x0, 0xf, r2, 0x14) sendfile(r5, r3, 0x0, 0x5) mmap(&(0x7f0000886000/0x2000)=nil, 0x2000, 0x1, 0x8010, r4, 0x6f518000) [ 3495.371918][T20326] FAULT_INJECTION: forcing a failure. [ 3495.371918][T20326] name failslab, interval 1, probability 0, space 0, times 0 [ 3495.384548][T20326] CPU: 0 PID: 20326 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3495.394694][T20326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3495.395029][T20334] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3495.404743][T20326] Call Trace: [ 3495.404752][T20326] dump_stack+0x137/0x19d [ 3495.420416][T20326] should_fail+0x23c/0x250 [ 3495.424835][T20326] __should_failslab+0x81/0x90 [ 3495.429697][T20326] should_failslab+0x5/0x20 [ 3495.434193][T20326] kmem_cache_alloc_node+0x58/0x2b0 [ 3495.439420][T20326] ? mntput+0x45/0x70 [ 3495.443397][T20326] ? dup_task_struct+0x63/0x630 [ 3495.448314][T20326] dup_task_struct+0x63/0x630 [ 3495.453140][T20326] copy_process+0x3ff/0x2e00 [ 3495.455886][T20334] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3495.457737][T20326] ? should_fail+0xd6/0x250 [ 3495.470265][T20326] ? copy_clone_args_from_user+0x3ab/0x420 [ 3495.476064][T20326] kernel_clone+0x14b/0x680 [ 3495.480563][T20326] __se_sys_clone3+0x194/0x1d0 [ 3495.485322][T20326] ? __cond_resched+0x11/0x40 [ 3495.490036][T20326] ? perf_trace_sys_exit+0x4d/0x160 [ 3495.495232][T20326] ? fput+0x2d/0x130 [ 3495.499195][T20326] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3495.505382][T20326] ? syscall_trace_enter+0x153/0x290 [ 3495.510731][T20326] ? exit_to_user_mode_prepare+0x65/0x190 [ 3495.516439][T20326] __x64_sys_clone3+0x2d/0x40 [ 3495.521106][T20326] do_syscall_64+0x4a/0x90 [ 3495.525531][T20326] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3495.531454][T20326] RIP: 0033:0x4665d9 [ 3495.535341][T20326] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3495.554944][T20326] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3495.563359][T20326] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 06:27:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000000b00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3495.571318][T20326] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3495.579436][T20326] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3495.587423][T20326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3495.595389][T20326] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3495.608605][T20340] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:29 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x40801, 0x50) r5 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r5, &(0x7f00000009c0), 0xd4ba0ff) preadv(r5, &(0x7f0000000280), 0x0, 0xd9f, 0x0) 06:27:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000000c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:29 executing program 2 (fault-call:3 fault-nth:2): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3495.626850][T20340] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000000d00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390400002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000000e00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3495.728035][T20357] FAULT_INJECTION: forcing a failure. [ 3495.728035][T20357] name failslab, interval 1, probability 0, space 0, times 0 [ 3495.740733][T20357] CPU: 0 PID: 20357 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3495.750967][T20357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3495.761109][T20357] Call Trace: [ 3495.764378][T20357] dump_stack+0x137/0x19d [ 3495.768764][T20357] should_fail+0x23c/0x250 [ 3495.773191][T20357] ? prepare_creds+0x2a/0x3f0 [ 3495.777863][T20357] __should_failslab+0x81/0x90 [ 3495.782634][T20357] should_failslab+0x5/0x20 [ 3495.787150][T20357] kmem_cache_alloc+0x46/0x2f0 [ 3495.791922][T20357] ? __mod_lruvec_page_state+0xff/0x130 [ 3495.797518][T20357] prepare_creds+0x2a/0x3f0 [ 3495.802017][T20357] copy_creds+0xe4/0x340 [ 3495.806254][T20357] copy_process+0x616/0x2e00 [ 3495.810866][T20357] ? should_fail+0xd6/0x250 [ 3495.815376][T20357] ? copy_clone_args_from_user+0x3ab/0x420 [ 3495.821276][T20357] kernel_clone+0x14b/0x680 06:27:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000100)) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x109842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r1, 0xbff000) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) r3 = syz_open_dev$ptys(0xc, 0x3, 0x1) ftruncate(r0, 0x2007ffe) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000001d00)={0x0, 0x0, 0x0}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x81, 0x0, 0x49, 0x7, 0x0, 0xffffffff, 0x4401, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x480, 0x84, 0x4, 0x2, 0x1, 0x2e2, 0x2, 0x0, 0x80, 0x0, 0x4}, 0x0, 0xf, r2, 0x14) sendfile(r5, r3, 0x0, 0x5) mmap(&(0x7f0000886000/0x2000)=nil, 0x2000, 0x1, 0x8010, r4, 0x6f518000) 06:27:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390500002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3495.825788][T20357] __se_sys_clone3+0x194/0x1d0 [ 3495.830594][T20357] ? __cond_resched+0x11/0x40 [ 3495.835364][T20357] ? perf_trace_sys_exit+0x4d/0x160 [ 3495.840552][T20357] ? fput+0x2d/0x130 [ 3495.844437][T20357] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3495.850592][T20357] ? syscall_trace_enter+0x153/0x290 [ 3495.855869][T20357] ? exit_to_user_mode_prepare+0x65/0x190 [ 3495.861637][T20357] __x64_sys_clone3+0x2d/0x40 [ 3495.866314][T20357] do_syscall_64+0x4a/0x90 [ 3495.870738][T20357] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3495.876706][T20357] RIP: 0033:0x4665d9 [ 3495.880595][T20357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3495.900218][T20357] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3495.908625][T20357] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3495.916658][T20357] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 06:27:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390600002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006900034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3495.924665][T20357] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3495.932672][T20357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3495.940649][T20357] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390700002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:30 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) r1 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/../file0\x00', 0x419e02, 0x0) pwritev(r2, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47fffe0}], 0x18, 0x400fa7f, 0x4) chdir(&(0x7f00000000c0)='./file0\x00') r3 = signalfd(r0, &(0x7f0000000080)={[0x7]}, 0x8) recvfrom(r3, &(0x7f0000000280)=""/213, 0xd5, 0x2, &(0x7f0000000180)=@ax25={{0x3, @null, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @default]}, 0x80) 06:27:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000000f00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:30 executing program 2 (fault-call:3 fault-nth:3): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390800002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001000034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='iocharset=iso8859-2,gid=', @ANYRESHEX=r2, @ANYBLOB="2ca2009326d1d0c9cf5d8efb726f6469722c00"]) [ 3496.160340][T20402] FAULT_INJECTION: forcing a failure. [ 3496.160340][T20402] name failslab, interval 1, probability 0, space 0, times 0 [ 3496.172975][T20402] CPU: 0 PID: 20402 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3496.183123][T20402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3496.193192][T20402] Call Trace: [ 3496.196481][T20402] dump_stack+0x137/0x19d [ 3496.200944][T20402] should_fail+0x23c/0x250 [ 3496.205361][T20402] __should_failslab+0x81/0x90 [ 3496.210186][T20402] should_failslab+0x5/0x20 [ 3496.214681][T20402] kmem_cache_alloc_node+0x58/0x2b0 [ 3496.219937][T20402] ? alloc_vmap_area+0x12f/0x1340 [ 3496.224980][T20402] ? avc_has_perm_noaudit+0x19a/0x240 [ 3496.230503][T20402] alloc_vmap_area+0x12f/0x1340 [ 3496.235361][T20402] ? kmem_cache_alloc_node_trace+0x1f6/0x2e0 [ 3496.241381][T20402] __get_vm_area_node+0x165/0x260 [ 3496.246405][T20402] __vmalloc_node_range+0xc2/0x5b0 [ 3496.251607][T20402] ? copy_process+0x3ff/0x2e00 [ 3496.256376][T20402] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 3496.261859][T20402] dup_task_struct+0x473/0x630 [ 3496.266707][T20402] ? copy_process+0x3ff/0x2e00 [ 3496.271539][T20402] copy_process+0x3ff/0x2e00 [ 3496.276190][T20402] ? should_fail+0xd6/0x250 [ 3496.280727][T20402] ? copy_clone_args_from_user+0x3ab/0x420 [ 3496.286539][T20402] kernel_clone+0x14b/0x680 [ 3496.291112][T20402] __se_sys_clone3+0x194/0x1d0 [ 3496.295976][T20402] ? __cond_resched+0x11/0x40 [ 3496.300686][T20402] ? perf_trace_sys_exit+0x4d/0x160 [ 3496.306003][T20402] ? fput+0x2d/0x130 [ 3496.309952][T20402] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3496.316155][T20402] ? syscall_trace_enter+0x153/0x290 [ 3496.321523][T20402] ? exit_to_user_mode_prepare+0x65/0x190 [ 3496.327252][T20402] __x64_sys_clone3+0x2d/0x40 [ 3496.331921][T20402] do_syscall_64+0x4a/0x90 [ 3496.336350][T20402] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3496.342241][T20402] RIP: 0033:0x4665d9 [ 3496.346136][T20402] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3496.365789][T20402] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3496.374226][T20402] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3496.382173][T20402] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3496.390124][T20402] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3496.398184][T20402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3496.406172][T20402] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3496.414315][T20402] syz-executor.2: vmalloc size 16384 allocation failure: vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 3496.430478][T20402] CPU: 0 PID: 20402 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3496.440623][T20402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3496.450679][T20402] Call Trace: [ 3496.454016][T20402] dump_stack+0x137/0x19d [ 3496.458378][T20402] warn_alloc+0x105/0x160 [ 3496.462694][T20402] ? kfree+0xf0/0x1d0 [ 3496.466813][T20402] __vmalloc_node_range+0x222/0x5b0 [ 3496.472006][T20402] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 3496.477500][T20402] dup_task_struct+0x473/0x630 [ 3496.482345][T20402] ? copy_process+0x3ff/0x2e00 [ 3496.487108][T20402] copy_process+0x3ff/0x2e00 [ 3496.491683][T20402] ? should_fail+0xd6/0x250 [ 3496.496228][T20402] ? copy_clone_args_from_user+0x3ab/0x420 [ 3496.502068][T20402] kernel_clone+0x14b/0x680 [ 3496.506657][T20402] __se_sys_clone3+0x194/0x1d0 [ 3496.511413][T20402] ? __cond_resched+0x11/0x40 [ 3496.516098][T20402] ? perf_trace_sys_exit+0x4d/0x160 [ 3496.521352][T20402] ? fput+0x2d/0x130 [ 3496.525242][T20402] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3496.531325][T20402] ? syscall_trace_enter+0x153/0x290 [ 3496.536599][T20402] ? exit_to_user_mode_prepare+0x65/0x190 [ 3496.542392][T20402] __x64_sys_clone3+0x2d/0x40 [ 3496.547052][T20402] do_syscall_64+0x4a/0x90 [ 3496.551549][T20402] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3496.557490][T20402] RIP: 0033:0x4665d9 [ 3496.561358][T20402] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3496.580989][T20402] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3496.589388][T20402] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3496.597337][T20402] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3496.605320][T20402] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3496.613313][T20402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3496.621282][T20402] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3496.629285][T20402] Mem-Info: [ 3496.632400][T20402] active_anon:1830 inactive_anon:163416 isolated_anon:0 [ 3496.632400][T20402] active_file:29512 inactive_file:74058 isolated_file:0 [ 3496.632400][T20402] unevictable:3 dirty:216 writeback:0 [ 3496.632400][T20402] slab_reclaimable:7708 slab_unreclaimable:28173 [ 3496.632400][T20402] mapped:67940 shmem:17166 pagetables:94147 bounce:0 [ 3496.632400][T20402] free:1531164 free_pcp:685 free_cma:0 [ 3496.669925][T20402] Node 0 active_anon:7320kB inactive_anon:653664kB active_file:118048kB inactive_file:296232kB unevictable:12kB isolated(anon):0kB isolated(file):0kB mapped:271760kB dirty:864kB writeback:0kB shmem:68664kB writeback_tmp:0kB kernel_stack:54384kB pagetables:376588kB all_unreclaimable? no [ 3496.697085][T20402] Node 0 DMA free:15360kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3496.723233][T20402] lowmem_reserve[]: 0 2938 7916 7916 [ 3496.728633][T20402] Node 0 DMA32 free:3013472kB min:4220kB low:7228kB high:10236kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:3013524kB mlocked:0kB bounce:0kB free_pcp:52kB local_pcp:52kB free_cma:0kB [ 3496.755986][T20402] lowmem_reserve[]: 0 0 4978 4978 [ 3496.761008][T20402] Node 0 Normal free:3095864kB min:7152kB low:12248kB high:17344kB reserved_highatomic:0KB active_anon:7320kB inactive_anon:653628kB active_file:118060kB inactive_file:296136kB unevictable:12kB writepending:972kB present:5242880kB managed:5098252kB mlocked:0kB bounce:0kB free_pcp:2672kB local_pcp:1440kB free_cma:0kB [ 3496.790845][T20402] lowmem_reserve[]: 0 0 0 0 [ 3496.795397][T20402] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 3496.808056][T20402] Node 0 DMA32: 4*4kB (M) 2*8kB (M) 4*16kB (M) 4*32kB (M) 6*64kB (M) 4*128kB (M) 5*256kB (M) 5*512kB (M) 4*1024kB (M) 1*2048kB (M) 733*4096kB (M) = 3013472kB [ 3496.824122][T20402] Node 0 Normal: 104*4kB (UME) 75*8kB (UME) 38*16kB (UME) 11*32kB (ME) 10*64kB (UME) 14*128kB (UME) 6*256kB (UME) 1*512kB (U) 5*1024kB (UME) 6*2048kB (UM) 750*4096kB (UM) = 3095864kB [ 3496.842349][T20402] Node 0 hugepages_total=5 hugepages_free=4 hugepages_surp=1 hugepages_size=2048kB [ 3496.851644][T20402] 76121 total pagecache pages [ 3496.856330][T20402] 0 pages in swap cache 06:27:31 executing program 0: r0 = socket(0x1000000000000010, 0x80802, 0x0) sendmmsg(r0, &(0x7f0000002b80)=[{{&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x2, 0x1, 0x3, 0x0, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5}}}, 0x80, &(0x7f0000000400)=[{&(0x7f00000000c0)="a6028e0cd47b7d6eb4c337e31ef1d3251e8a585dd979f05680f28bfe60743d4fae05c76af340fe8d5dbfb027e3fda15b6841af15e82f75254199092808e63c6dc5483ca005d376b9c007d90c44903845d6ab85ce67690ae817659a12a0e6a72c93eb12a065c14104869b49082e6edff29f5baee4a8c190f18c26bb57b63b7f911069d4fb", 0x84}, {&(0x7f0000000180)="24ba45b222d46ca7068aacb75dd9631cf3014594f41a1857af1bca3b6d50c28f91c8750a5c62298bc6e5a530a5f0c2ffa1f1d91ebb94b01bb84f9daf1cd4d1386db69fa6afa233c655cfbeb9cf23f16b3cc8b13c95255806c10b8a86cb2fb61a5952344b07a069ee25299048636da098dc7b14b9c59e525f0e3ee829c4aa75fa", 0x80}, {&(0x7f0000000200)="8273b975d5a3bb4b099412e002769348f9330b87a0c04d0f546046da7b8d980022d56d1b7d69e47c64d3b4c46498b0fbf297e67a36aadcf0ca", 0x39}, {&(0x7f0000000240)="f2d8745b0fd382bc2fa65d1006a1022fd552a1bd1dc9f22a8a882825ae9ad5956530cb50228054667bc90faf1aa53f535a7572c94518f1c335f1924dd032fe473c260256f0fa7dfc537aaeab19912e6b4fc0fed2efcd248f8921cd9c21dbacb84de2e6286f588738fde736dcb9e1b59f501a04cace62b6afca3f2d85b58f8a2f5ef25cd74b8c93e7f03ba6d37db817a530e98103eae3ab663d9b20ac356eb7e75af513df8ccd4c04f97d5b3921a17771ff2c1f4d9de9fe8ac9ebb0c9e2", 0xbd}, {&(0x7f0000000300)="80a8169038623df8846e144edb3db7b7c2cdd0d291c494d6910b5be69e11b40bbdea9602d0f822bd16fa2e9fdb9155e62bffb83bae1aefd64c664d9ee3eff7ffe6bf30", 0x43}, {&(0x7f0000000380)="a51546a7b30f6fa7deab48a44a539628c86c41d6a9eb1ddb1c7f9d8a15d8a13bbbc650a91281838714c6ebe622564e83f592b62aced71a0ee63de1b83422f12916931f9d324263b861746c7ec00c7ff9e0ba6a19c3eb4b1e65a52410c7d7de345e5cd460cd536b8944b6", 0x6a}], 0x6, &(0x7f0000000480)=[{0x90, 0x113, 0x4, "1fa2f7a4d6b64dd2fcd195a2699bdc6a5d511b21ea19182e02c8137900a47acea86897caea2f3425bf50536cc748d8090fd2d3da5b3ba8d4a6e5a4b3154896a771640602c8a129a9ff128a51ae91e06ed31f05e47181344bcc1258b1d40cc46ab00eef24786c778134f85a2c61c914b6c2022048859cd298f550287e"}, {0x58, 0x10a, 0x800, "4f84ddfc75f6960150908fdb62d3eac340bd0524858fddd4191dd925b8ddcdc7509e9d10fc21b27f30bb1ef631d30e0badc35b869db866e1c9618f5384e7452cbc9f"}], 0xe8}}, {{&(0x7f0000000580)=@nfc={0x27, 0x1, 0x0, 0x1}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000000600)="d0df02b51060c729c98c4e4d3af8c5cee4a1d15ee9e4fd857bed411eaae76cb56a028f76baf8743fedefbb73fd6c16a0fb66c4c0068635b76c0e69a48e4223410a13acfe1c8d28abbd0bfd13b858c8bc1e024a4eda74396469b3b5c720b6c184aa005bdfe38ceaf101775d11b42107926f8c60afdcca7f334770f9027ef74148cdc1deb4029357a7897d82553ed9a67c565a2d9a36f64d0dff836da95c165b6528a0e5fa4aa6d95ba556e17c479d5fcbd0ed41d94dc9ad3ed9f306941038f2f20c4c0038427439d36a1a8bd1e0a6f58a6e925b2730a96ce3c0", 0xd9}, {&(0x7f0000000700)="78098c33a3062e6ada56b53c94f837b08d8e0bbf955f1b93ebd94a3a8922a2ceb90a068e569160edeaf3f10bfda4acc4bff8973570f9a76ef6e609", 0x3b}, {&(0x7f0000000740)="a9ceebc50d9e6f205c97af92f77e0903010709900ac303edf7222de4c74b59fbd5f854b6a13892257c58dfa4b9771a246fdd110c022fc003f36668355013f7db70a238c920a09b5360a6233a428ccff2f76c6885fe42bfba408b44735e346e211a54b58bd754656c5ef65146655b9ea4c2142469115977cf8af22d0337d17532e61a1f2808dba215ab8006fd3e25170e564184b8510439cf8689ad5fee700217bbe87f103f", 0xa5}, {&(0x7f0000000800)}, {&(0x7f0000000940)="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", 0x1000}, {&(0x7f0000000840)="447b219eaa25c7968d8bfff4ee51c3973c238281b1162881cbd35c62075126cd66aa9bac7b13c16fc9a2ec32b3dffdf967b3328d5a7618d3fde0984a37131e33624d5c4added70296a98749d2dfcc18419e5f2318664ad1ad6a6ef6decc3ed3418c0b94e37d907322982115bb8c5d5e7d37770f44ca6c57e95ff5ce9", 0x7c}, {&(0x7f0000001940)="399e7a0a6d45334eb1c26002795f5ba463462d40ed9bb5dd7fedf2431f2dbb6a51a817bbe9c6e78642a3332400e61e0bb7b5643178fbf67bc774f9d75eac404f9c1fe3f80189363c793e9554b52e05eab0f057c4b86bb3ec28e57e0e017e2ba3baa4638856264e4b1f038ab36273eb98e82b676cf25d074747", 0x79}], 0x7, &(0x7f0000001a40)=[{0x1010, 0x109, 0x6, "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"}, {0x50, 0x88, 0x8, "d60005b38a52c3f27d0695e2017fc6e4b39cc076d92dd40255e0ae5ed950fd7854efd4721321e770f3f44c5052eb38c7c810f9d3284b1bb23d"}, {0x58, 0x10d, 0xaaea, "137395d4fb2a422e07d7c9610be10f66b5935efd4aa20aff80e3bba59ab6e0b98cfd54a4ad28e712a49d22febb8b2ac1a7155511c0065df0ced82aca6b0ddfd323fdc9"}, {0x88, 0x10d, 0x3, "eb9d0eb22b3335b33b4ec2cc206a1b22b1aec8f7dc46689a2e02bd2c7ca7b641a91c99c0698c18f89576b4134482a3cbfe2edf0ecd66bdbcaa5d18fcda7d33d4071623ae234c8d7b5447c34a4ad1c5ede95b5435a8781e739d8a4dc686cda319e29ae1e64371973e8b3814d15c81cec57af9"}], 0x1140}}], 0x2, 0x804) write(r0, &(0x7f0000000000)="240000005200ff0f00000000220b04000a04f51108000100020000005fb1144d4a3cfcc309d5cbdc0800028001000000", 0x30) recvmsg(r0, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, 0x12, 0xffffffffffffffff, 0x8f2a2000) 06:27:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390900002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001100034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006f00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:31 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x0, 0x10000008, 0x9, 0x2b, 0x800, 0xd788, 0xffff, 0x4, 0xfff}, 0x0) socketpair$unix(0x1, 0x200400000000003, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x924924924924c31, 0xc0) setsockopt$sock_int(r2, 0x1, 0x7, &(0x7f00000000c0), 0x4) write$binfmt_script(r2, 0x0, 0x62) close(r1) r3 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x11) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000280)={0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f00000000c0)={{r4, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa1, 0x7, 0x5, 0x6}, 0x18, [0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f00000001c0)={{r4, 0x0, 0xfff, 0x81, 0x5, 0x8000, 0x0, 0x401, 0x6, 0x101, 0x3f, 0x1, 0x3800000, 0x80000000, 0xfff}, 0x40, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 06:27:31 executing program 2 (fault-call:3 fault-nth:4): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3496.860471][T20402] Swap cache stats: add 0, delete 0, find 0/0 [ 3496.866546][T20402] Free swap = 0kB [ 3496.870257][T20402] Total swap = 0kB [ 3496.873982][T20402] 2097051 pages RAM [ 3496.877782][T20402] 0 pages HighMem/MovableOnly [ 3496.882532][T20402] 65267 pages reserved [ 3496.942223][T20417] FAULT_INJECTION: forcing a failure. [ 3496.942223][T20417] name failslab, interval 1, probability 0, space 0, times 0 [ 3496.954984][T20417] CPU: 1 PID: 20417 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3496.965141][T20417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3496.975185][T20417] Call Trace: [ 3496.978512][T20417] dump_stack+0x137/0x19d [ 3496.982848][T20417] should_fail+0x23c/0x250 [ 3496.987265][T20417] ? create_user_ns+0x3a9/0x870 06:27:31 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x80000, 0x20005) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x2, @multicast2}, 0x10) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000001a00)) [ 3496.992132][T20417] __should_failslab+0x81/0x90 [ 3496.996918][T20417] should_failslab+0x5/0x20 [ 3497.001412][T20417] kmem_cache_alloc+0x46/0x2f0 [ 3497.006191][T20417] ? current_chrooted+0x159/0x190 [ 3497.011259][T20417] create_user_ns+0x3a9/0x870 [ 3497.015936][T20417] copy_creds+0x140/0x340 [ 3497.020258][T20417] copy_process+0x616/0x2e00 [ 3497.024848][T20417] ? should_fail+0xd6/0x250 [ 3497.029355][T20417] ? copy_clone_args_from_user+0x3ab/0x420 [ 3497.035172][T20417] kernel_clone+0x14b/0x680 06:27:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001200034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390a00002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007000034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xfff, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="7fd77f536c7983d1940c225f6d7aaa107161aa8dfd8092c249edff81a8d08e9a9976d5d0417937d61fd85db92bd8f9e251830bfc4ced579bc2b0d38ab89adc4129f1f7ec65df5d493cb0c1d5084e717fc3e526093760225812f7eb54f7d1f26d1480409c4b03548d0e04d50aadfeb879584b9b6814af6ac8e8cbd166ac97ba3b04e44369901c8caef2cfe87ab9cf85d6a625df", 0x93, 0x9}, {&(0x7f00000000c0)="be19b2b7ebc2c7896aac4be1112c2ee2c9a320fe5e6bba04662c325a39d57ad0c21c34e862246a0bbd63aac010dbc76c", 0x30, 0x1}], 0x4002, &(0x7f0000000300)={[{@dots}], [{@appraise_type}, {@obj_type}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x32, 0x62, 0x68, 0x39, 0x2a, 0x36, 0x66], 0x2d, [0x33, 0x64, 0x63, 0x426582bd68b7f5bb], 0x2d, [0x32, 0x34, 0x61, 0x61], 0x2d, [0x38, 0x33, 0x62, 0x34], 0x2d, [0x30, 0x32, 0x64, 0x39, 0x62, 0x65, 0x34, 0x30]}}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@uid_gt={'uid>', 0xffffffffffffffff}}]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mremap(&(0x7f0000230000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f00005cb000/0x4000)=nil) madvise(&(0x7f0000713000/0x2000)=nil, 0x2000, 0x15) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000000380)="50914d4d00504d4dff", 0x9, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000ddf4655fddf4655fddf4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000008081000000180000ddf4655fddf4655fddf4655f00000000000001000c00000010000800000000000af3030004000000000000000000000001", 0xb9, 0x8d00}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="a7ff562b447aa5"]) [ 3497.039716][T20417] __se_sys_clone3+0x194/0x1d0 [ 3497.044591][T20417] ? __cond_resched+0x11/0x40 [ 3497.049269][T20417] ? perf_trace_sys_exit+0x4d/0x160 [ 3497.054470][T20417] ? fput+0x2d/0x130 [ 3497.058358][T20417] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3497.064457][T20417] ? syscall_trace_enter+0x153/0x290 [ 3497.069773][T20417] ? exit_to_user_mode_prepare+0x65/0x190 [ 3497.075494][T20417] __x64_sys_clone3+0x2d/0x40 [ 3497.080166][T20417] do_syscall_64+0x4a/0x90 [ 3497.084675][T20417] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3497.090571][T20417] RIP: 0033:0x4665d9 [ 3497.094460][T20417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3497.114124][T20417] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3497.122578][T20417] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3497.130585][T20417] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 06:27:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390b00002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001600034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3497.138550][T20417] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3497.146546][T20417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3497.154514][T20417] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:31 executing program 2 (fault-call:3 fault-nth:5): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:31 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0/file1\x00', 0x100, 0x15) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) writev(0xffffffffffffffff, &(0x7f0000001480)=[{&(0x7f0000000080)="3dcdfb2e773fb0a91addef70e0b8e5f0437b618014e293923e886e7fe2f2a520e32ec0185817454e28e79cfa5d373419d2da40c64ce4632b66757701a91c92a6f1cadaa53cb6a14bd6ae539fb9b458b483a9083d67c6606b87f08a343531f20d528d080ca236aabb6376260fdd9ba273611f77d199ef17c0a82c733a40e0c24a68c4c72c5b79e15c11c6eb769efd28f6e9d821494dbdf421dd7db5966f9bfa4e0796434ac05b7753d840368625158337f9b6367e9c6692868816fe6048cc34b05764cf1e9f75f30eeab46fea33d2cab9fd25199c80ed82b4bc3edd4d45c4", 0xde}, {&(0x7f0000000180)="c650c88bfefa5eea18f2cde406cc2c0d28aef581d8741c587e6722551f4820892a90dac1edf528f0b4fe98", 0x2b}, {&(0x7f00000001c0)="c9ee189467fab2cd699dac67bf1d403a1dfb940d6165caedeef8ffffffffffffff1528c78ae88aa424c9fef717dfc749d98b911fc8f1081876ea665974ba3aa2c37923ba5880023c3188a2f55cc9fdfb43349d5d9eca4f0a8182f277d5c2b4c1466e93ae2c4a9f31a77bc683d3a79b9be2ed0a678f4d1148b231156989fb30d9004c61d8fd006a1a1d883d3e9bd439b0085a8afd5ac5", 0x96}, {&(0x7f0000000280)="f84cac3052e0704801e71f3ecc8ff2f26c6a8415dca73f4ae2d6a5dd5eb5d3edbf4762aa78d06f5c80ad495e589e96b10189535980a76d876e11", 0x3a}, {&(0x7f00000015c0)="ff7f9b57480c5bf6215f00000000aa0300ffff0ada8b42560ce507dbf89f21381e18f0bcb00730dfe936000000000000000045663b2f0f6599f7ba0c865c0b7c6fea9ecfd0b26cd7c5a5da1a14c10bcb1d35775c513c846b9dbd1fcf5be8646db34018d3562b40e76bdc16462acd6d1b71e36a852e4e5db38f02a296880fb27162b1332b203466e6eaf18d65c992d2", 0x8f}, {&(0x7f0000000300)="f9a6ed4edfa29361f3a90cc9431956445213", 0x12}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="49b9c3d0e7e2", 0x6}, {&(0x7f0000001380)="fbd0d1cd82036b5216d4dd96b56671d96a75b11ff784e9c21588d406ea21675e104b978a4dca1796b473ca249158cfc017a702ab3dac78e2c3017425dbdbf61b9051021b84d72eb074b490ef7f11c283751bc91ce54106a52b851d63c0a9d8577f5f7dc8116f43f910d8342746753bd743fb735ad5fb090a1aec5a2f92a226b06f04d5a6da1437a1fd5c3070fff26afb0329c09d3e69f47cce3b8ef430706abe011a3cccd6ecea047809c75dbfe7f69aadcf9e88ae1889795677e713ae5098650ac6a95f6d093e4c57765a8c0c", 0xcd}], 0x9) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) ioctl$BTRFS_IOC_RESIZE(r2, 0x50009403, &(0x7f0000001540)=ANY=[@ANYRES32=r0, @ANYBLOB="00000000303030303030f3c80be9b9756eee3030313511f350"]) ioctl$GIO_SCRNMAP(r0, 0x5609, &(0x7f0000000000)=""/101) 06:27:31 executing program 5: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0x69de, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='personality\x00') epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0xff12ecfaaae7c5bd}) 06:27:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390c00002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:31 executing program 0: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000003, 0x50, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x7, 0x810, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x110, r0, 0xd55d0000) 06:27:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3497.265200][T20448] FAULT_INJECTION: forcing a failure. [ 3497.265200][T20448] name failslab, interval 1, probability 0, space 0, times 0 [ 3497.277828][T20448] CPU: 1 PID: 20448 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3497.288041][T20448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3497.298090][T20448] Call Trace: [ 3497.301376][T20448] dump_stack+0x137/0x19d [ 3497.305757][T20448] should_fail+0x23c/0x250 [ 3497.310257][T20448] ? setup_userns_sysctls+0x42/0x1c0 [ 3497.315561][T20448] __should_failslab+0x81/0x90 [ 3497.320464][T20448] should_failslab+0x5/0x20 [ 3497.324997][T20448] __kmalloc_track_caller+0x64/0x340 [ 3497.330284][T20448] kmemdup+0x21/0x50 [ 3497.334175][T20448] setup_userns_sysctls+0x42/0x1c0 [ 3497.339283][T20448] create_user_ns+0x71f/0x870 [ 3497.343950][T20448] copy_creds+0x140/0x340 [ 3497.348272][T20448] copy_process+0x616/0x2e00 [ 3497.352856][T20448] ? should_fail+0xd6/0x250 [ 3497.357357][T20448] ? copy_clone_args_from_user+0x3ab/0x420 06:27:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007500034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3497.363173][T20448] kernel_clone+0x14b/0x680 [ 3497.367695][T20448] __se_sys_clone3+0x194/0x1d0 [ 3497.372488][T20448] ? __cond_resched+0x11/0x40 [ 3497.377164][T20448] ? perf_trace_sys_exit+0x4d/0x160 [ 3497.382361][T20448] ? fput+0x2d/0x130 [ 3497.386258][T20448] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3497.392335][T20448] ? syscall_trace_enter+0x153/0x290 [ 3497.397711][T20448] ? exit_to_user_mode_prepare+0x65/0x190 [ 3497.403470][T20448] __x64_sys_clone3+0x2d/0x40 [ 3497.408232][T20448] do_syscall_64+0x4a/0x90 06:27:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390d00002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3497.412699][T20448] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3497.418593][T20448] RIP: 0033:0x4665d9 [ 3497.422552][T20448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3497.442231][T20448] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3497.450643][T20448] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3497.458611][T20448] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3497.466583][T20448] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3497.474543][T20448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3497.482522][T20448] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3497.503800][T20466] __nla_validate_parse: 4 callbacks suppressed 06:27:31 executing program 0: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x9, 0x8, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYRES64], 0xa) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693cece34", 0x7}], 0x1) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x80000) ioctl$BTRFS_IOC_SNAP_DESTROY(r1, 0x5000940f, &(0x7f0000000640)={{r0}, "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"}) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) mbind(&(0x7f0000230000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000538000/0x2000)=nil, 0x2000, 0x9fe247763dca331b) r3 = syz_io_uring_complete(0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0xa) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) mmap(&(0x7f000008a000/0x4000)=nil, 0x4000, 0x0, 0x1010, r2, 0x46ac0000) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x9, 0x0, 0x3, 0x0, 0x0, 0x6, 0x1000, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x6}, 0x108a1, 0x100000000, 0x0, 0x0, 0x1, 0x7, 0x1, 0x0, 0x4, 0x0, 0xffff}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x1) munlock(&(0x7f00000c2000/0x4000)=nil, 0x4000) 06:27:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390e00002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:31 executing program 2 (fault-call:3 fault-nth:6): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3497.503812][T20466] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.4'. 06:27:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007700034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3497.550829][T20478] FAULT_INJECTION: forcing a failure. [ 3497.550829][T20478] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3497.564094][T20478] CPU: 0 PID: 20478 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3497.574325][T20478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3497.584509][T20478] Call Trace: [ 3497.587895][T20478] dump_stack+0x137/0x19d [ 3497.592314][T20478] should_fail+0x23c/0x250 [ 3497.596725][T20478] __alloc_pages+0x102/0x320 [ 3497.601350][T20478] __vmalloc_node_range+0x319/0x5b0 [ 3497.606544][T20478] dup_task_struct+0x473/0x630 [ 3497.611332][T20478] ? copy_process+0x3ff/0x2e00 [ 3497.616197][T20478] copy_process+0x3ff/0x2e00 [ 3497.620785][T20478] ? should_fail+0xd6/0x250 [ 3497.625280][T20478] ? copy_clone_args_from_user+0x3ab/0x420 [ 3497.631179][T20478] kernel_clone+0x14b/0x680 [ 3497.635722][T20478] __se_sys_clone3+0x194/0x1d0 [ 3497.640509][T20478] ? __cond_resched+0x11/0x40 [ 3497.645201][T20478] ? perf_trace_sys_exit+0x4d/0x160 [ 3497.650404][T20478] ? fput+0x2d/0x130 [ 3497.654279][T20478] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3497.660403][T20478] ? syscall_trace_enter+0x153/0x290 [ 3497.665664][T20478] ? exit_to_user_mode_prepare+0x65/0x190 [ 3497.671414][T20478] __x64_sys_clone3+0x2d/0x40 [ 3497.676189][T20478] do_syscall_64+0x4a/0x90 [ 3497.680591][T20478] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3497.686595][T20478] RIP: 0033:0x4665d9 [ 3497.690487][T20478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3497.710072][T20478] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3497.718485][T20478] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3497.726445][T20478] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3497.734450][T20478] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3497.742506][T20478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 06:27:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="391000002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3497.750530][T20478] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3497.772758][T20469] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.4'. 06:27:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="391100002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:32 executing program 2 (fault-call:3 fault-nth:7): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000029c0)={0x0, 0x1e00, &(0x7f0000000100)={&(0x7f0000000180)={0x1c, 0x10, 0x701, 0x0, 0x0, {0xa, 0x0, 0x2800}, [@typed={0x6, 0x1, 0x0, 0x0, @str='\x1c\x00'}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), r0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7272}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3f}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x0) 06:27:32 executing program 0: ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e22, 0xf4b, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}}, 0x0, 0x0, 0x5, 0x0, "a1f6f656a908764eb7adc89808a02b10e5ecbd6fb227b29df6493fdf22f88e619888c8c16936fc6cb3397bd644f7777e8d204ec828464d198b5b6c6e4ee6e5f8d9a31d247614bec9bdb745ce3b2beb3b"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000100)={0x2, 0x3}, 0x8) sendto$inet(r1, 0x0, 0xffffffffffffff7c, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r3, &(0x7f00000009c0), 0xd4ba0ff) ioctl$F2FS_IOC_GARBAGE_COLLECT(r3, 0x4004f506, &(0x7f0000000180)) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) close(r1) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000140)={0x8}) write$binfmt_aout(r1, &(0x7f0000000a00)={{0x10b, 0x9, 0x3, 0x195, 0x1cb, 0x0, 0x64, 0x40}, "909b38552d5226fa06660cf2", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa2c) [ 3498.170680][T20498] selinux_netlink_send: 15 callbacks suppressed [ 3498.170724][T20498] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=120 sclass=netlink_route_socket pid=20498 comm=syz-executor.3 [ 3498.173850][T20499] FAULT_INJECTION: forcing a failure. [ 3498.173850][T20499] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3498.203226][T20499] CPU: 0 PID: 20499 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 06:27:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3498.213427][T20499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3498.223474][T20499] Call Trace: [ 3498.226752][T20499] dump_stack+0x137/0x19d [ 3498.229982][T20503] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3498.231089][T20499] should_fail+0x23c/0x250 [ 3498.231114][T20499] __alloc_pages+0x102/0x320 [ 3498.249465][T20499] __vmalloc_node_range+0x319/0x5b0 [ 3498.254713][T20499] dup_task_struct+0x473/0x630 [ 3498.259494][T20499] ? copy_process+0x3ff/0x2e00 [ 3498.264297][T20499] copy_process+0x3ff/0x2e00 06:27:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="391200002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:32 executing program 0: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x11, r2, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x21) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x8) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) socket$packet(0x11, 0x0, 0x300) syz_open_dev$tty20(0xc, 0x4, 0x1) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x1000baa) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, &(0x7f00000006c0)) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, 0x0, 0x8400fffffffa) [ 3498.268929][T20499] ? should_fail+0xd6/0x250 [ 3498.273425][T20499] ? copy_clone_args_from_user+0x3ab/0x420 [ 3498.276010][T20503] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3498.279266][T20499] kernel_clone+0x14b/0x680 [ 3498.279287][T20499] __se_sys_clone3+0x194/0x1d0 [ 3498.297844][T20499] ? __cond_resched+0x11/0x40 [ 3498.302513][T20499] ? perf_trace_sys_exit+0x4d/0x160 [ 3498.307745][T20499] ? fput+0x2d/0x130 [ 3498.311637][T20499] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3498.317717][T20499] ? syscall_trace_enter+0x153/0x290 [ 3498.323154][T20499] ? exit_to_user_mode_prepare+0x65/0x190 [ 3498.328881][T20499] __x64_sys_clone3+0x2d/0x40 [ 3498.333693][T20499] do_syscall_64+0x4a/0x90 [ 3498.338103][T20499] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3498.343991][T20499] RIP: 0033:0x4665d9 [ 3498.347891][T20499] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 06:27:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007700034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3498.367509][T20499] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3498.375919][T20499] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3498.383886][T20499] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3498.391850][T20499] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3498.399861][T20499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3498.401067][T20510] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=122 sclass=netlink_route_socket pid=20510 comm=syz-executor.3 06:27:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="392500002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:32 executing program 2 (fault-call:3 fault-nth:8): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:32 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x4, 0x10000) socket$netlink(0x10, 0x3, 0xb) recvmmsg(0xffffffffffffffff, &(0x7f0000005380)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000380)=""/15, 0xf}, {&(0x7f00000003c0)=""/192, 0xc0}, {&(0x7f0000000480)=""/27, 0x1b}, {&(0x7f0000000180)=""/162, 0xa2}, {&(0x7f0000000580)=""/113, 0x71}, {&(0x7f0000000600)}, {&(0x7f0000000640)=""/234, 0xea}, {&(0x7f0000000740)=""/124, 0x7c}, {&(0x7f00000007c0)=""/66, 0x42}, {&(0x7f00000004c0)=""/187, 0xbb}], 0xa, &(0x7f00000009c0)=""/245, 0xf5}, 0x6}, {{&(0x7f0000000ac0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000b40)=""/147, 0x93}], 0x1}, 0x5}, {{&(0x7f0000000c40)=@sco={0x1f, @none}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x200}, {{0x0, 0x0, &(0x7f0000003e80)=[{&(0x7f0000002dc0)=""/4096, 0x609}, {&(0x7f0000003dc0)=""/169, 0xa9}], 0x2, &(0x7f0000003ec0)=""/13, 0xd}, 0x6}, {{&(0x7f0000003f00)=@in6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f00000051c0)=[{&(0x7f0000003f80)=""/172, 0xac}, {0x0}, {&(0x7f00000040c0)=""/56, 0x38}], 0x3, &(0x7f0000005240)=""/153, 0x99}, 0x7ed}, {{0x0, 0x0, &(0x7f0000005300), 0x0, &(0x7f0000005340)=""/2, 0x2}, 0x6395}], 0x6, 0x10101, &(0x7f0000000100)={0x77359400}) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340), 0x10000, 0x0) r1 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0), 0xd4ba0ff) close_range(r0, r1, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r3 = socket$inet6(0xa, 0x802, 0x88) connect$inet6(r3, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg(r3, &(0x7f0000002cc0), 0x1a3, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={@loopback, @ipv4={'\x00', '\xff\xff', @remote}, @private1, 0x1, 0x3, 0x200, 0x400, 0x4, 0x40000000}) syz_open_dev$vcsa(&(0x7f0000000040), 0x93, 0x800) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r5 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) setsockopt$SO_BINDTODEVICE_wg(r4, 0x1, 0x19, &(0x7f0000000240)='wg1\x00', 0x4) sendfile(r5, r5, &(0x7f0000000000)=0x7, 0x3) [ 3498.407824][T20499] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3498.432260][T20512] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=20512 comm=syz-executor.4 06:27:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390002006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3498.484899][T20518] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=20518 comm=syz-executor.4 [ 3498.510103][T20523] FAULT_INJECTION: forcing a failure. [ 3498.510103][T20523] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3498.523486][T20523] CPU: 0 PID: 20523 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 06:27:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390003006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="394800002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3498.533644][T20523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3498.543690][T20523] Call Trace: [ 3498.546976][T20523] dump_stack+0x137/0x19d [ 3498.551360][T20523] should_fail+0x23c/0x250 [ 3498.555823][T20523] __alloc_pages+0x102/0x320 [ 3498.560436][T20523] __vmalloc_node_range+0x319/0x5b0 [ 3498.565637][T20523] dup_task_struct+0x473/0x630 [ 3498.570395][T20523] ? copy_process+0x3ff/0x2e00 [ 3498.575147][T20523] copy_process+0x3ff/0x2e00 [ 3498.579737][T20523] ? should_fail+0xd6/0x250 [ 3498.584237][T20523] ? copy_clone_args_from_user+0x3ab/0x420 [ 3498.590115][T20523] kernel_clone+0x14b/0x680 [ 3498.594619][T20523] __se_sys_clone3+0x194/0x1d0 [ 3498.599482][T20523] ? __cond_resched+0x11/0x40 [ 3498.604174][T20523] ? perf_trace_sys_exit+0x4d/0x160 [ 3498.609375][T20523] ? fput+0x2d/0x130 [ 3498.613274][T20523] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3498.619402][T20523] ? syscall_trace_enter+0x153/0x290 [ 3498.624702][T20523] ? exit_to_user_mode_prepare+0x65/0x190 [ 3498.630422][T20523] __x64_sys_clone3+0x2d/0x40 06:27:32 executing program 5: llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x4140, 0x0) [ 3498.635095][T20523] do_syscall_64+0x4a/0x90 [ 3498.639513][T20523] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3498.645418][T20523] RIP: 0033:0x4665d9 [ 3498.649319][T20523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3498.669029][T20523] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3498.677432][T20523] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 06:27:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013d8004700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3498.685403][T20523] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3498.693370][T20523] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3498.701335][T20523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3498.709296][T20523] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x5, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000280)=""/96, 0x60) 06:27:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="394c00002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3498.773849][T20534] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=55315 sclass=netlink_route_socket pid=20534 comm=syz-executor.4 [ 3498.804558][T20545] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=55315 sclass=netlink_route_socket pid=20545 comm=syz-executor.4 06:27:33 executing program 2 (fault-call:3 fault-nth:9): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390004006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="396000002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:33 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004300)=[{{&(0x7f0000000000)={0xa, 0x2, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f0000001240)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0, 0x0, 0x0, 0x300000000000000}}], 0x2, 0x0) 06:27:33 executing program 0: openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x101000, 0x101, 0x2}, 0x18) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000002c0)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000000300)="20000000000100000e6c93ec4f001d000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b000000800000000800000052470000620174f84d3528b40089a1f4bab91d8ab813e6b8b6e50102129c6f9c24f7bc5aadd2980894f4ce3619914f17cbfc3131777d7f64738bc89061a73971a643050940f1ef5baadd9794d0d79ecb640e1855531603fa2345789c5246d2025437ed71cbbf4ac135579e4bd172f542a147f7299ed5235da1e5d379487fde57d4968549ebe4801acea44d0357f21066aa4b7a7400"/257, 0x101, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000000180)="8f14c8aebd992f7a870b06a3dc9d373276ef665d6cd83663bca43d16e0da572bb4e22ad58696c7a434549369f7152c93d87678be8ee5c89f265f2d7fc7d1455f8e6434a288eba0470b53ec551f4486c1a2ded82a307c", 0x56, 0x4400}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x1b, &(0x7f0000000040)=ANY=[@ANYBLOB="55a6c0190010b6ba"]) 06:27:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013e8004700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3499.201746][T20561] validate_nla: 30 callbacks suppressed [ 3499.201760][T20561] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3499.217299][T20563] FAULT_INJECTION: forcing a failure. [ 3499.217299][T20563] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3499.230571][T20563] CPU: 1 PID: 20563 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3499.240726][T20563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3499.250774][T20563] Call Trace: [ 3499.254042][T20563] dump_stack+0x137/0x19d [ 3499.258385][T20563] should_fail+0x23c/0x250 [ 3499.262797][T20563] __alloc_pages+0x102/0x320 [ 3499.267384][T20563] __vmalloc_node_range+0x319/0x5b0 [ 3499.272704][T20563] dup_task_struct+0x473/0x630 [ 3499.277483][T20563] ? copy_process+0x3ff/0x2e00 [ 3499.282247][T20563] copy_process+0x3ff/0x2e00 [ 3499.286899][T20563] ? should_fail+0xd6/0x250 [ 3499.291401][T20563] ? copy_clone_args_from_user+0x3ab/0x420 [ 3499.297212][T20563] kernel_clone+0x14b/0x680 [ 3499.301768][T20563] __se_sys_clone3+0x194/0x1d0 [ 3499.306610][T20563] ? __cond_resched+0x11/0x40 [ 3499.311302][T20563] ? perf_trace_sys_exit+0x4d/0x160 [ 3499.316531][T20563] ? fput+0x2d/0x130 [ 3499.320465][T20563] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3499.326516][T20563] ? syscall_trace_enter+0x153/0x290 [ 3499.331819][T20563] ? exit_to_user_mode_prepare+0x65/0x190 [ 3499.337541][T20563] __x64_sys_clone3+0x2d/0x40 [ 3499.342235][T20563] do_syscall_64+0x4a/0x90 [ 3499.346684][T20563] entry_SYSCALL_64_after_hwframe+0x44/0xae 06:27:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="396800002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:33 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) readv(r1, &(0x7f00000015c0)=[{&(0x7f0000000100)=""/240, 0xf0}], 0x1) r2 = signalfd4(r1, &(0x7f00000000c0)={[0xffffffffffffeb3a]}, 0x8, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, 0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x0, 0x20000000000001, 0x0, 0x0) close(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x3}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={0x0}}, 0x0) [ 3499.352623][T20563] RIP: 0033:0x4665d9 [ 3499.356605][T20563] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3499.376225][T20563] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3499.384646][T20563] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3499.392690][T20563] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 06:27:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390005006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:33 executing program 2 (fault-call:3 fault-nth:10): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3499.400655][T20563] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3499.408615][T20563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3499.416581][T20563] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3499.425010][T20561] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59411 sclass=netlink_route_socket pid=20561 comm=syz-executor.4 06:27:33 executing program 5: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000080)='./bus\x00', 0x7, 0x1, &(0x7f00000000c0)=[{&(0x7f00000001c0)="c3d637bbf44f6ff375c8ef8d30f002215418b61144a74a81f064752811c3da609bf1765ebd19eb567fa53f59b7e1996f93798147b0ed3081f3e043908c3257123da36198b7ce00ffcbc6a2d1ad2f5b32e4368a46ae690267b38b48c02b955b1bf4ab3ee8c11a62d67f1f25c5c2a5aa6d33a81679aa34a257003db23d1370f7d0c8b4f8d03edb5120b706957c525f8b69f6ec382f6fdb82069a402054077cb3b9848ef2a6dcf7ecb4a084fc20334825", 0xaf}], 0x1800800, &(0x7f0000000140)={[{'\\,(&,:#'}, {'/-'}, {'#%.'}], [{@dont_appraise}]}) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) utime(&(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)={0x857, 0x81}) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0xfd14) fallocate(r0, 0x100000003, 0x7fffff, 0x800001) 06:27:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="396c00002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3499.468336][T20561] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3499.479115][T20580] FAULT_INJECTION: forcing a failure. [ 3499.479115][T20580] name failslab, interval 1, probability 0, space 0, times 0 [ 3499.491747][T20580] CPU: 1 PID: 20580 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3499.501953][T20580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3499.512034][T20580] Call Trace: [ 3499.515304][T20580] dump_stack+0x137/0x19d [ 3499.519657][T20580] should_fail+0x23c/0x250 [ 3499.524055][T20580] ? prepare_creds+0x2a/0x3f0 [ 3499.528738][T20580] __should_failslab+0x81/0x90 [ 3499.533506][T20580] should_failslab+0x5/0x20 [ 3499.537998][T20580] kmem_cache_alloc+0x46/0x2f0 [ 3499.542537][T20582] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59411 sclass=netlink_route_socket pid=20582 comm=syz-executor.4 [ 3499.542741][T20580] ? __mod_lruvec_page_state+0xff/0x130 [ 3499.561344][T20580] prepare_creds+0x2a/0x3f0 06:27:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390006006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3499.565841][T20580] copy_creds+0xe4/0x340 [ 3499.570103][T20580] copy_process+0x616/0x2e00 [ 3499.574756][T20580] ? should_fail+0xd6/0x250 [ 3499.579255][T20580] ? copy_clone_args_from_user+0x3ab/0x420 [ 3499.585040][T20580] kernel_clone+0x14b/0x680 [ 3499.589537][T20580] __se_sys_clone3+0x194/0x1d0 [ 3499.594292][T20580] ? __cond_resched+0x11/0x40 [ 3499.598962][T20580] ? perf_trace_sys_exit+0x4d/0x160 [ 3499.604155][T20580] ? fput+0x2d/0x130 [ 3499.608044][T20580] ? fpregs_assert_state_consistent+0x7d/0x90 06:27:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="397400002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3499.614141][T20580] ? syscall_trace_enter+0x153/0x290 [ 3499.619441][T20580] ? exit_to_user_mode_prepare+0x65/0x190 [ 3499.625198][T20580] __x64_sys_clone3+0x2d/0x40 [ 3499.629871][T20580] do_syscall_64+0x4a/0x90 [ 3499.634284][T20580] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3499.640172][T20580] RIP: 0033:0x4665d9 [ 3499.644048][T20580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 06:27:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="397a00002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130e014700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3499.663660][T20580] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3499.672092][T20580] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3499.680056][T20580] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3499.688021][T20580] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3499.696020][T20580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3499.703987][T20580] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:33 executing program 5: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r1 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x800) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(0xffffffffffffffff, 0x8010671f, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x440) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$inet_buf(r1, 0x0, 0x2f, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x36, &(0x7f0000000080)=""/111, &(0x7f00000002c0)=0x6f) sendmsg$inet(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)}, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) sendto$inet(r0, &(0x7f0000000200)="49dad9d556c0adbda75a675ec2756dcaa2c36ee87259c3c8f1458122258e458f482ae8fff459465617914d3e2be4893d7966a1aaf45829d3a06ab7c2e7b737e0cec6f4a427a705f42f02d556994ebaa1629edaa53028c267cf26165f9a105623491e2914d4d6efae0a354ad893c2ecc9a949d340747ce58fc8df55908dac83c33ef59c34a9d6b7b4e503b7421ca7d3", 0x8f, 0x8000, &(0x7f0000000140)={0x2, 0x4e24, @local}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$tcp_mem(0xffffffffffffff9c, 0x0, 0x1, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)=0x6, 0x4) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000040)=0x1, 0x4) 06:27:33 executing program 2 (fault-call:3 fault-nth:11): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390007006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3499.762167][T20599] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3499.780934][T20599] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3603 sclass=netlink_route_socket pid=20599 comm=syz-executor.4 [ 3499.794843][T20599] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3499.805262][T20602] FAULT_INJECTION: forcing a failure. [ 3499.805262][T20602] name failslab, interval 1, probability 0, space 0, times 0 [ 3499.808299][T20603] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3603 sclass=netlink_route_socket pid=20603 comm=syz-executor.4 [ 3499.817894][T20602] CPU: 0 PID: 20602 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3499.841014][T20602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3499.851059][T20602] Call Trace: [ 3499.854324][T20602] dump_stack+0x137/0x19d [ 3499.858678][T20602] should_fail+0x23c/0x250 [ 3499.863201][T20602] ? create_user_ns+0x3a9/0x870 [ 3499.868042][T20602] __should_failslab+0x81/0x90 [ 3499.872801][T20602] should_failslab+0x5/0x20 [ 3499.877366][T20602] kmem_cache_alloc+0x46/0x2f0 [ 3499.882129][T20602] ? current_chrooted+0x159/0x190 [ 3499.887162][T20602] create_user_ns+0x3a9/0x870 [ 3499.891832][T20602] copy_creds+0x140/0x340 [ 3499.896165][T20602] copy_process+0x616/0x2e00 [ 3499.900794][T20602] ? should_fail+0xd6/0x250 [ 3499.905350][T20602] ? copy_clone_args_from_user+0x3ab/0x420 [ 3499.911137][T20602] kernel_clone+0x14b/0x680 [ 3499.915632][T20602] __se_sys_clone3+0x194/0x1d0 [ 3499.920403][T20602] ? __cond_resched+0x11/0x40 [ 3499.925076][T20602] ? perf_trace_sys_exit+0x4d/0x160 [ 3499.930251][T20602] ? fput+0x2d/0x130 [ 3499.934127][T20602] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3499.940300][T20602] ? syscall_trace_enter+0x153/0x290 [ 3499.945576][T20602] ? exit_to_user_mode_prepare+0x65/0x190 [ 3499.951309][T20602] __x64_sys_clone3+0x2d/0x40 [ 3499.955966][T20602] do_syscall_64+0x4a/0x90 [ 3499.960402][T20602] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3499.966362][T20602] RIP: 0033:0x4665d9 [ 3499.970246][T20602] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3499.989944][T20602] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3499.998334][T20602] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3500.006370][T20602] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3500.014366][T20602] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3500.022323][T20602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3500.030376][T20602] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:34 executing program 0: creat(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7472616e733d746370736aa5e55b94f85b632e0a80d939379101035410510f1a4b834e7db58532378d1b26fbec046fdab41ce19ae3784ccd4cd93fc0fbca34e3f77e14c6"]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) quotactl(0xffffffffffffff80, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000240)="4cfa0a8746eae36507e6488bc31c8a7943b1ad9b704d19a59085ffcb7e70fb785c4320de2938bc647cbd801ee86353a9aeb2802c01ab295bdbec1005cfd06d1a772142c51730698739aa7abeafbcf0a68db6b8ee7dbf51d0503bae75627d84b905d6ed11c9eb65e6bae8c7c0c3a6a5866bedaf0ebd404450bbf6a571b5f805242986e69e531a8196d125850746d4") 06:27:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390003002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390008006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001302034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:34 executing program 2 (fault-call:3 fault-nth:12): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3500.232075][T20614] 9pnet: Could not find request transport: tcpsj[[c. [ 3500.232075][T20614] 97TQKN}27&oڴxLL?4~ [ 3500.248678][T20618] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3500.259909][T20618] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3500.260092][T20619] FAULT_INJECTION: forcing a failure. [ 3500.260092][T20619] name failslab, interval 1, probability 0, space 0, times 0 [ 3500.276864][T20622] 9pnet: Could not find request transport: tcpsj[[c. [ 3500.276864][T20622] 97TQKN}27&oڴxLL?4~ [ 3500.280613][T20619] CPU: 1 PID: 20619 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3500.304061][T20619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3500.314214][T20619] Call Trace: [ 3500.317585][T20619] dump_stack+0x137/0x19d [ 3500.321920][T20619] should_fail+0x23c/0x250 [ 3500.326369][T20619] __should_failslab+0x81/0x90 [ 3500.331183][T20619] should_failslab+0x5/0x20 [ 3500.335672][T20619] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 3500.341385][T20619] ? __kmalloc_node+0x30/0x40 [ 3500.346209][T20619] __kmalloc_node+0x30/0x40 [ 3500.350724][T20619] kvmalloc_node+0x81/0xf0 [ 3500.355231][T20619] alloc_fdtable+0x112/0x1b0 [ 3500.359884][T20619] dup_fd+0x548/0x6e0 [ 3500.363873][T20619] copy_process+0xb70/0x2e00 [ 3500.368491][T20619] kernel_clone+0x14b/0x680 [ 3500.373000][T20619] __se_sys_clone3+0x194/0x1d0 [ 3500.377773][T20619] ? __cond_resched+0x11/0x40 06:27:34 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz0', "adc8cdd37b4c2206fc37b6a37706fe2a9f5be21353efe71af7ce6891b118561e1de5454b6bf93351380b4884518bf545252142dd461dc6b807dae92c3f7ab607d8b9243508ce1f3b8636d4f03e66c7b1065748a52547d3554b8796c390346808c9006fe9a3461a0b69612f53b992de43eb9dd12a68333c6af615147371dc4b8c47a496c4fbbce4d89694610c5d096d73f352e3402712f31ee78afa9ad2162ac25447522d"}, 0xa8) r1 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x401000000001, 0x0) close(r2) r3 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r2, r3, 0x0, 0xffffdffa) lseek(r1, 0x0, 0x4) read(r1, &(0x7f0000000180)=""/19, 0xfffffe47) 06:27:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001303034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3500.382454][T20619] ? perf_trace_sys_exit+0x4d/0x160 [ 3500.387691][T20619] ? fput+0x2d/0x130 [ 3500.391570][T20619] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3500.397626][T20619] ? syscall_trace_enter+0x153/0x290 [ 3500.402910][T20619] ? exit_to_user_mode_prepare+0x65/0x190 [ 3500.408681][T20619] __x64_sys_clone3+0x2d/0x40 [ 3500.413352][T20619] do_syscall_64+0x4a/0x90 [ 3500.417780][T20619] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3500.423667][T20619] RIP: 0033:0x4665d9 [ 3500.427551][T20619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3500.447305][T20619] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3500.455692][T20619] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3500.463643][T20619] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3500.471618][T20619] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:27:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390009006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390005002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3500.479584][T20619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3500.487535][T20619] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3500.506225][T20628] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3500.517847][T20628] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:34 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000140)="04e504090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000001840)='./file1\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x501000, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x2, 0xe4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x1, 0x30) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ftruncate(r1, 0x800) open(&(0x7f0000000180)='./file1\x00', 0x80080, 0x100) unlink(&(0x7f00000001c0)='./bus\x00') lseek(r1, 0x1200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x46000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)) move_mount(0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) 06:27:34 executing program 2 (fault-call:3 fault-nth:13): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001304034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000a006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390006002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:34 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz0', "adc8cdd37b4c2206fc37b6a37706fe2a9f5be21353efe71af7ce6891b118561e1de5454b6bf93351380b4884518bf545252142dd461dc6b807dae92c3f7ab607d8b9243508ce1f3b8636d4f03e66c7b1065748a52547d3554b8796c390346808c9006fe9a3461a0b69612f53b992de43eb9dd12a68333c6af615147371dc4b8c47a496c4fbbce4d89694610c5d096d73f352e3402712f31ee78afa9ad2162ac25447522d"}, 0xa8) r1 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x401000000001, 0x0) close(r2) r3 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r2, r3, 0x0, 0xffffdffa) lseek(r1, 0x0, 0x4) read(r1, &(0x7f0000000180)=""/19, 0xfffffe47) [ 3500.730423][T20650] FAULT_INJECTION: forcing a failure. [ 3500.730423][T20650] name failslab, interval 1, probability 0, space 0, times 0 [ 3500.743102][T20650] CPU: 0 PID: 20650 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3500.753303][T20650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3500.763349][T20650] Call Trace: [ 3500.766622][T20650] dump_stack+0x137/0x19d [ 3500.767745][T20651] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3500.770954][T20650] should_fail+0x23c/0x250 [ 3500.770980][T20650] ? copy_fs_struct+0x2e/0x130 [ 3500.788200][T20650] __should_failslab+0x81/0x90 [ 3500.793055][T20650] should_failslab+0x5/0x20 [ 3500.796672][T20651] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3500.797550][T20650] kmem_cache_alloc+0x46/0x2f0 [ 3500.797574][T20650] ? dup_fd+0x4bb/0x6e0 [ 3500.797594][T20650] copy_fs_struct+0x2e/0x130 [ 3500.797616][T20650] copy_process+0xc30/0x2e00 [ 3500.823725][T20650] kernel_clone+0x14b/0x680 [ 3500.828227][T20650] __se_sys_clone3+0x194/0x1d0 [ 3500.833048][T20650] ? __cond_resched+0x11/0x40 [ 3500.837715][T20650] ? perf_trace_sys_exit+0x4d/0x160 [ 3500.842943][T20650] ? fput+0x2d/0x130 [ 3500.846846][T20650] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3500.852961][T20650] ? syscall_trace_enter+0x153/0x290 [ 3500.858292][T20650] ? exit_to_user_mode_prepare+0x65/0x190 [ 3500.864166][T20650] __x64_sys_clone3+0x2d/0x40 [ 3500.868925][T20650] do_syscall_64+0x4a/0x90 [ 3500.873364][T20650] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3500.879258][T20650] RIP: 0033:0x4665d9 [ 3500.883142][T20650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3500.902808][T20650] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3500.911316][T20650] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3500.919281][T20650] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 06:27:34 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYRES16, @ANYBLOB="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"], 0x2}}, 0x0) write(r0, &(0x7f0000000240)="5a1400001a0025f00485bc04fef7001d0a0b49ff708800008003281202020100fc0000001300000036ede498534108e58342fa94a235a2a441f9", 0xfcae) r1 = inotify_init1(0x800) write$binfmt_misc(r1, &(0x7f00000000c0)={'syz0', "f386c04498f603177a73e140fe297f793acfa7b240b718e8133479439c82f16d9097a66f77d396398e5bce86e444420d56052789895d41b286da0e88c87f448f59f3033bcb94910f25fad3a20f11e8668c9e96808619060833e4ff3df647"}, 0x62) 06:27:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390007002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390009002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3500.927350][T20650] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3500.935316][T20650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3500.943282][T20650] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3500.962599][T20664] netlink: 2562 bytes leftover after parsing attributes in process `syz-executor.5'. 06:27:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000a002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:35 executing program 5: r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffff9]}, 0x0, 0x8) timer_create(0x0, &(0x7f00009cefa8)={0x0, 0x12, 0x4, @tid=r0}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x1, 0x9, 0x4, 0x16c5, 0x80, 0x40, 0xeb2, 0x2}, &(0x7f0000000100)={0x4, 0x4, 0x1, 0x7, 0x20, 0x6, 0x7fffffff, 0x4}, &(0x7f0000000180)={0x3, 0x6, 0x5, 0x0, 0x2, 0x2, 0x100000000, 0xfffffffffffffe00}, &(0x7f00000001c0)={0x0, 0x3938700}, &(0x7f0000000240)={&(0x7f0000000200)={[0x9]}, 0x8}) timer_settime(0x0, 0x1, &(0x7f0000000080)={{0x0, 0x3938700}, {r1, r2+10000000}}, 0x0) rt_sigtimedwait(&(0x7f0000000140)={[0xfffffffffffffff7]}, 0x0, 0x0, 0x8) 06:27:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000b002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000b006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:35 executing program 2 (fault-call:3 fault-nth:14): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001305034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030005, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000001f0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010002000000d7f4655f000000000100000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x82000, &(0x7f0000013800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000380)) chown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, r0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8983, &(0x7f00000001c0)) [ 3500.984672][T20666] netlink: 2562 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3501.065641][T20675] FAULT_INJECTION: forcing a failure. [ 3501.065641][T20675] name failslab, interval 1, probability 0, space 0, times 0 [ 3501.078400][T20675] CPU: 0 PID: 20675 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3501.088543][T20675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3501.098701][T20675] Call Trace: [ 3501.101971][T20675] dump_stack+0x137/0x19d [ 3501.106307][T20675] should_fail+0x23c/0x250 [ 3501.110777][T20675] ? copy_process+0xd29/0x2e00 [ 3501.115601][T20675] __should_failslab+0x81/0x90 [ 3501.120379][T20675] should_failslab+0x5/0x20 [ 3501.124874][T20675] kmem_cache_alloc+0x46/0x2f0 [ 3501.129799][T20675] ? path_get+0x3c/0x50 [ 3501.133952][T20675] copy_process+0xd29/0x2e00 [ 3501.138542][T20675] kernel_clone+0x14b/0x680 [ 3501.143068][T20675] __se_sys_clone3+0x194/0x1d0 [ 3501.147918][T20675] ? __cond_resched+0x11/0x40 [ 3501.152615][T20675] ? perf_trace_sys_exit+0x4d/0x160 [ 3501.157869][T20675] ? fput+0x2d/0x130 [ 3501.161764][T20675] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3501.167842][T20675] ? syscall_trace_enter+0x153/0x290 [ 3501.173169][T20675] ? exit_to_user_mode_prepare+0x65/0x190 [ 3501.178881][T20675] __x64_sys_clone3+0x2d/0x40 [ 3501.183583][T20675] do_syscall_64+0x4a/0x90 [ 3501.188006][T20675] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3501.193913][T20675] RIP: 0033:0x4665d9 06:27:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000c002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000c006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SEQ_ADJ_ORIG={0x4}]}, 0x68}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000180)='./file0\x00', 0x10, 0x9e) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:27:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001306034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3501.197803][T20675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3501.217415][T20675] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3501.225872][T20675] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3501.233848][T20675] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3501.241810][T20675] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3501.249781][T20675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3501.257827][T20675] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000d002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000d006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000e006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000e002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:36 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x80019e) openat$bsg(0xffffffffffffff9c, 0x0, 0x20800, 0x0) setreuid(0xee01, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, &(0x7f0000000900)) setreuid(0x0, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) sched_setattr(r0, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0xc140, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000004, 0x810, r5, 0x48178000) sendfile(r4, r5, 0x0, 0x401ffc000) 06:27:36 executing program 2 (fault-call:3 fault-nth:15): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001307034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffff4}]}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xda\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa8K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xe0\x9d\xb3Yn\xa7\xd4\xd5AU\xe5\xb9\xef\xb9)\xa1\x153\x15\b\xcb\xf7\xefw\x00\x00\x00\x00', 0x0) ftruncate(r0, 0x1000000) r1 = memfd_create(&(0x7f0000000600)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\x13\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe4\x84\xcb\xf4\xa1\xf8\xe5\x89\xe5\xa7\xad\xc9q\xad\x929\xf1\xe7\xb0\"\xd7Ad\r)6!]G\x8a\x917\xd7\x05\xe3\xbb\xc8J\xdc!9E\xcd\x92\xc6x\x95\x14', 0x0) ftruncate(r1, 0x1000000) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x101202, 0x0) sendfile(r2, r1, 0x0, 0xeefffdef) sendfile(r1, r0, 0x0, 0xeefffdef) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x1, 0x0) [ 3502.066960][T20720] FAULT_INJECTION: forcing a failure. [ 3502.066960][T20720] name failslab, interval 1, probability 0, space 0, times 0 [ 3502.079654][T20720] CPU: 0 PID: 20720 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3502.089812][T20720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3502.099876][T20720] Call Trace: [ 3502.103148][T20720] dump_stack+0x137/0x19d [ 3502.107537][T20720] should_fail+0x23c/0x250 [ 3502.111948][T20720] ? copy_process+0xe7e/0x2e00 [ 3502.116742][T20720] __should_failslab+0x81/0x90 [ 3502.121541][T20720] should_failslab+0x5/0x20 [ 3502.126061][T20720] kmem_cache_alloc+0x46/0x2f0 [ 3502.130841][T20720] ? copy_process+0xd29/0x2e00 [ 3502.135685][T20720] copy_process+0xe7e/0x2e00 [ 3502.140404][T20720] kernel_clone+0x14b/0x680 [ 3502.144988][T20720] __se_sys_clone3+0x194/0x1d0 [ 3502.149760][T20720] ? __cond_resched+0x11/0x40 [ 3502.154445][T20720] ? perf_trace_sys_exit+0x4d/0x160 [ 3502.159721][T20720] ? fput+0x2d/0x130 [ 3502.163627][T20720] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3502.169778][T20720] ? syscall_trace_enter+0x153/0x290 [ 3502.175064][T20720] ? exit_to_user_mode_prepare+0x65/0x190 [ 3502.180789][T20720] __x64_sys_clone3+0x2d/0x40 [ 3502.185466][T20720] do_syscall_64+0x4a/0x90 [ 3502.189880][T20720] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3502.195804][T20720] RIP: 0033:0x4665d9 [ 3502.199690][T20720] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3502.219352][T20720] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3502.227761][T20720] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3502.235794][T20720] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3502.243814][T20720] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3502.251856][T20720] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3502.259981][T20720] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39c110002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390011002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390012002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390020002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001308034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390010006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001309034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390011006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:37 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x5, 0x6a, 0x0, 0x0, 0x3, 0x0, 0x400, 0x1f, 0x2}, 0x0) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f00000000c0)=0x1000baa) wait4(r1, 0x0, 0x1, &(0x7f0000000380)) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0xfffffffffffffe8c, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x80019e) getpid() sched_setattr(0x0, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x4e141, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0xc140, 0x0) getsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000080), 0x0) sendfile(r5, r6, 0x0, 0x401ffc000) 06:27:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390025002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130a034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390012006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:37 executing program 2 (fault-call:3 fault-nth:16): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:37 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000f80)='./file0\x00', 0x0, 0x0, &(0x7f0000002440), 0x0, &(0x7f0000002500)=ANY=[@ANYBLOB='f', @ANYBLOB=',']) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) [ 3503.173833][T20759] selinux_netlink_send: 15 callbacks suppressed [ 3503.173848][T20759] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2579 sclass=netlink_route_socket pid=20759 comm=syz-executor.4 [ 3503.205283][T20767] FAULT_INJECTION: forcing a failure. [ 3503.205283][T20767] name failslab, interval 1, probability 0, space 0, times 0 [ 3503.217938][T20767] CPU: 0 PID: 20767 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3503.228111][T20767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3503.238202][T20767] Call Trace: [ 3503.241479][T20767] dump_stack+0x137/0x19d [ 3503.245813][T20767] should_fail+0x23c/0x250 [ 3503.250228][T20767] ? dup_mm+0x2e/0x210 [ 3503.254292][T20767] __should_failslab+0x81/0x90 [ 3503.259181][T20767] should_failslab+0x5/0x20 [ 3503.263700][T20767] kmem_cache_alloc+0x46/0x2f0 [ 3503.268495][T20767] ? copy_process+0xe7e/0x2e00 [ 3503.273266][T20767] dup_mm+0x2e/0x210 [ 3503.277155][T20767] copy_process+0x1203/0x2e00 [ 3503.281863][T20767] kernel_clone+0x14b/0x680 [ 3503.286372][T20767] __se_sys_clone3+0x194/0x1d0 [ 3503.291130][T20767] ? __cond_resched+0x11/0x40 [ 3503.295797][T20767] ? perf_trace_sys_exit+0x4d/0x160 [ 3503.301027][T20767] ? fput+0x2d/0x130 [ 3503.305003][T20767] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3503.311073][T20767] ? syscall_trace_enter+0x153/0x290 [ 3503.316368][T20767] ? exit_to_user_mode_prepare+0x65/0x190 [ 3503.322128][T20767] __x64_sys_clone3+0x2d/0x40 [ 3503.326813][T20767] do_syscall_64+0x4a/0x90 [ 3503.331402][T20767] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3503.337327][T20767] RIP: 0033:0x4665d9 [ 3503.341207][T20767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3503.361031][T20767] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 06:27:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390048002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') r0 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) openat(r0, &(0x7f0000000040)='./file0\x00', 0x100000, 0x151) open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) truncate(&(0x7f0000000340)='./file0\x00', 0x81) sendfile(r2, r1, 0x0, 0x6) 06:27:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390025006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3503.369439][T20767] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3503.377448][T20767] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3503.385415][T20767] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3503.393409][T20767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3503.401395][T20767] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390048006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3503.421206][T20781] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2579 sclass=netlink_route_socket pid=20781 comm=syz-executor.4 06:27:37 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) 06:27:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39004c002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) fsetxattr$trusted_overlay_nlink(r2, &(0x7f00000000c0), &(0x7f0000000100)={'U+', 0x6}, 0x16, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff01c}, {0x6}]}, 0x10) 06:27:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130b034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39004c006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390060002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:38 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) 06:27:38 executing program 2 (fault-call:3 fault-nth:17): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3504.250772][T20808] validate_nla: 14 callbacks suppressed [ 3504.250813][T20808] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3504.261165][T20810] FAULT_INJECTION: forcing a failure. [ 3504.261165][T20810] name failslab, interval 1, probability 0, space 0, times 0 [ 3504.277141][T20810] CPU: 0 PID: 20810 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3504.287306][T20810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3504.297783][T20810] Call Trace: [ 3504.301048][T20810] dump_stack+0x137/0x19d [ 3504.305385][T20810] should_fail+0x23c/0x250 [ 3504.309805][T20810] ? dup_fd+0x48/0x6e0 [ 3504.313864][T20810] __should_failslab+0x81/0x90 [ 3504.318694][T20810] should_failslab+0x5/0x20 [ 3504.323186][T20810] kmem_cache_alloc+0x46/0x2f0 [ 3504.327945][T20810] ? avc_has_perm+0x59/0x150 [ 3504.332530][T20810] dup_fd+0x48/0x6e0 [ 3504.336420][T20810] ? selinux_task_alloc+0x6f/0x80 [ 3504.341657][T20810] copy_process+0xb70/0x2e00 [ 3504.346249][T20810] kernel_clone+0x14b/0x680 [ 3504.350738][T20810] __se_sys_clone3+0x194/0x1d0 [ 3504.355486][T20810] ? __cond_resched+0x11/0x40 [ 3504.360162][T20810] ? perf_trace_sys_exit+0x4d/0x160 [ 3504.365428][T20810] ? fput+0x2d/0x130 [ 3504.369341][T20810] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3504.375585][T20810] ? syscall_trace_enter+0x153/0x290 [ 3504.380857][T20810] ? exit_to_user_mode_prepare+0x65/0x190 [ 3504.386617][T20810] __x64_sys_clone3+0x2d/0x40 [ 3504.391280][T20810] do_syscall_64+0x4a/0x90 [ 3504.395733][T20810] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3504.401621][T20810] RIP: 0033:0x4665d9 [ 3504.405499][T20810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3504.425094][T20810] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3504.433491][T20810] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3504.441448][T20810] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 06:27:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390068002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3504.449444][T20810] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3504.457412][T20810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3504.465405][T20810] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3504.474913][T20816] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2835 sclass=netlink_route_socket pid=20816 comm=syz-executor.4 06:27:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390060006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:38 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) 06:27:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000040), 0x20) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) r3 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r3, &(0x7f00000009c0), 0xd4ba0ff) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0xba, 0x3, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, '\x00', [{0xa8, 0x7fffffff, 0x8, 0x5, 0x7, 0x5}, {0x1, 0x1, 0x0, 0x2b8, 0xfffffffffffffffd, 0x7}], ['\x00', '\x00']}) sendmmsg(r0, &(0x7f0000007400)=[{{&(0x7f00000002c0)=@phonet={0x23, 0x0, 0xf0, 0x1}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000340)="cacd68c1ddd329f3ced7cf62ea8d958a1f495423c9de05b9a87cbfaf163987c1beab282f79752befc914dba2f5d354490663086ce90571edf693657f5b20f70d203e952ab4d0025ea47cf4d1fc764c24048ccec3f10d36946443ae1f90623163d38f683b198a9cf1fe6c9ec9d7184e2df9d017e5b3bda7509dc7fdd14df766aa36ef", 0x82}, {&(0x7f0000000400)="7f6d1c9a473872234ce520ae794f7796f546361439c9431ee77dd1ac749da5385a5741c525ea8343a09fc228af559a472c8758ae32a89ea797deb65c0dd1c9e23e85aba234a26488d4bdc38fefbc57c5992980b071671dca6847f44982de548f958ca08a18a90689167a3e8d07719b25372a6b87475b4b83c264bd37b095a9911a6dc72d024d688d3c1051afca776d23f81d18656c746fb2f39a5cac0b0e5c91406ad7f4f8d903e0cf03efa3a35e841252776993d49e8c41b6b5c692edc9b540608bdc42f705c2d27d63f9599aa6a01274b0d7a545e78d2bea6f6850fb3a43e012eb29e07397d60e12d2dded6b", 0xed}], 0x2, &(0x7f0000000500)=[{0x90, 0x101, 0xb53, "bab69b35a4e7f58f5bfcde81d191b23a3968d6ab105c16493aaa260589f9014bc70eb1d4ac71aa1c25baab392b12066c31201723de8b6998d41bb33fc1d57f6165ea4096e8909be7ff61c3b81619f99b9361579041e69cdb9bf7041744b1441bf233cced460aa0f321ac8231bb04f6d178efd592f0e4d59538d3"}, {0x18, 0x10f, 0x2, "ba388d0bde7b1620"}, {0x108, 0x10b, 0x2, "96bae42daf053f5d99f92086be217496582d94cf54d750f9f364bf5e78ae9b2887e555d6e1cc18cc8569b02868b5269915a283c371d439618f4649653a531c13a9c6d67f8df6ff2dc7c15c83743b677faf75a7d11bc1758fb1a51e0421e5cc93a6a022ad1096d39088169b4178c09cb7ad8339583e4c18c501dbe6a3bc0c239a7b5a0eb71cd58ff2cf4864ee38d90ab5d90b1b3621732a8d86d00fb81ce86910b5583cb51ddc9dfea16ea84baab315dcf80761ac33016dbba5964719a8e8e6855799b94c592a624d089d2681e1c5acdb2ed44ebf43ea38f22b9493892913245b446a374093ff0367799377b1492cd4b60a"}], 0x1b0}}, {{&(0x7f00000006c0)=@un=@file={0x1, './file0/file1\x00'}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000740)="36aa8513f5d6afb25a5417caa0f91126381e6d016dc9ce4c5650e51fe8a22408c04b5e379ccb997cd2b84ef4044e254031ecdfed5c0ba5d4f704d55f9321ade170ee0786d692711124efdb7fa71a4a15f62e64bc9e48aff83e2e7f7c9153ccec23e459c5b51e229abf01af", 0x6b}], 0x1, &(0x7f0000000800)=[{0x48, 0x11, 0x8, "e69aad94ef2a2f8c4b107b0ff313abb3cb91260448e96692801de13480cee88c75e97662e9b1b0fac199472190db7a88c113efcb"}], 0x48}}, {{&(0x7f0000000880)=@sco, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000900)="8a6a6a713df8984cbd735b725a7cf2a04035604de24f4cd0dc15b39597ce2abb14874206fd2df122c224687f75c4cce43a3ef2a2445ed684ce776925e27abf1109d4aab48ed427b83e4edfdbccbc36c6df7ac0d7451a7a97fd516b986d3d2a0ed04b46bcaca70b8795edc2302384451e0eea3f8a1dd366f34217296ccd90f2a0c16bf5c18de1e5e924bb79043e7ddd07a20f115c85de1accafb8bfec0427d97b1bfc47b10a28ee99b105fa24de6afbfbe1a818c5eda1f028ac", 0xb9}, {&(0x7f0000000a00)="383016af1186591e7a5de0b444a6e15685cf95e00be0e40f0363ba883fd2100f82504954a2f2fc30cb7a215b922c6800abd734ad96a9e9f95db1ca696025a193b40897208d1fa7c535d4979cb9eaa6fa3fe19c8041a005ace9fe9450f941adb4b0a695b7a21b1b0409ef72e74b37236bb26d5d1c8b5deb313fd738a6fbce3f9fa0e8ee5a6a0a4dabbf2dc8e73a27b41f42be17beb3787df65e42ea03b046b08b0fcd2af16c76c1d97f2e0100ef960ab7f1989f77176e71c79d7154e6b56a3b81730ebd384aa27dc9b330f7c138ac4f6a00cd935a1955e2a60abab59cf3e4d4f5792fdef5638f1496ed8c3f8337e6634500f9fe", 0xf3}, {&(0x7f0000000b00)="505f7bab2200bfe92467254b33ca4838f9fee5d64315306d46de2ad5fcb02be33ea8137fac06f47593c143e2da3bb402e5ba6f96856869b0c0179558e2ba66c7e2d8b073956c70895bccbc491fe4a6d4d86975ef0597558409fa596a26b9ba4d21570ac1915828398daa77536713b5283bb340d928c3", 0x76}, {&(0x7f0000000b80)="28c4a4ba406a6dad420951d8d879cc55059f323c46a9004661932888e8a1bc6787c031c369e32b1e3c77c73f126b8657ffe73277a2281de9baeef78fa7770cb90a08026e6a26ccc3a428ccffdd15a32ca286", 0x52}, {&(0x7f0000000c00)="fe59746ff58f93160b1de9b04640f2f7763c45c12889b5c639a2d231e4c0de9c2fc40a717b3173f4ead3bfa0b2b0f6be7023665ab068243cd4a27ed1822a07cfd47432fd078732b7ed811947eb6b6a42b488c216d24cc9862d5ada136f1d75be1c20a5cc89f969d0c16e7ad13e20ea7d4bc65f6a9889623421299cc53e6fd4fdb6ad78ec019f0c46716bad3936b845018dbe9ac60a6618b291d577422b6f19383f146b9cb5eb75d5ff0a9013790d3372f49a373e", 0xb4}, {&(0x7f0000000cc0)="6896ec54d4780df85d33679d79bd2aac6b05e2cc00dcd4e0d2f093faa3135e92e90d42501b8f585151898bf153110f63f8fc118196e084b3b9432ec9d3b9824789e924c169b19dba108642d1cd939bb34b15390ede0fe439df11e98ab3462d368f", 0x61}, {&(0x7f0000000d40)="8a98359b5d01c3e704eff070efeeedc115effc7e9115acba69b36535233a9a5fcf6edca1623431fde588b26814d2df5a706922a11e3d463ccf6e5b6de72228038d56a8a4b4e432517646ca0e02337cc5dbe002788e13fec7af863f955db49664f4011c164d0c5f5c4df7d70c9a1a846e9cbe3cf80274070cf498239fcc3095d2d3856a838e3986bd7f9c4e7b4820d7b4a2172720451c7ebc7f1b62f16a4a92cbd4f55448e875d954a7d59c63cb185704ea2d5ac75e2515404eec5296", 0xbc}], 0x7, &(0x7f0000000e80)=[{0x108, 0x105, 0x4, "e76d173ca986b6110c9eabe2fc15a2678b328abcf8ea489768e17ee10aade24624ce3b4c860d6bde247d3385da1e6c742d176a3eae114c2ae3e0584b1edccf15d74c4cd27dbc5c9f7e8920005fcb2f02db7645eda947669ea6afff67a860430dac30f3a567d2dc47c82ff8d526b188907db7fe81e18cbed7a078b2b6315f027179050cd84ace48a01af129f479fffc9047a405adaa9bbf9fa7531e7042e1f9337f30743616a4f7da867072b90db51c13e13d9855f1c7c60bcd77a604137bcadb8c4d4addbd3fefac3816fc9c8fcc66d5a8a3fbeb23c08ce53c65c14a46788432b2d9c5630af4dfd193aed444ec3037d084f4b51c42"}], 0x108}}, {{&(0x7f0000000fc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x0, 0x0, 0x4, 0x4, {0xa, 0x4e23, 0x1ff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xcd2}}}, 0x80, &(0x7f0000001240)=[{&(0x7f0000001040)="04cbd87910e46b1a83f11e1a76dafc5f7c6eb823199c6762d50dad28097b73116e2e28ffedf8dccd2dfa20e1d478d2202ba7ccf7d1f25d56048cedcd0b01c669c165", 0x42}, {&(0x7f00000010c0)="c6dd91c5c69de98a0366fd5e959256c5c296717f69a6a2ded92ee36a70ec7e35661a9ca61950b4530d8724a8171d6e1a8f44a5f3455a0fb86e5842bf1d30e6c09808bf1368e54914b476736ee9b2fdb551d83366e3a4916a6872e359da68082568d7cc26381bf93b2d71d1850de2e7483db964270b2cdef30a213cc43dd2eb096352db7f5205cc8519929a648cc4ca9d5a761f50c61e36cb02c12c5652f4ed5e7288718f38e40bcfdd8963f9d9f6c2f96196938a4e0630", 0xb7}, {&(0x7f0000001180)="919569da6434150e3e1f5a65ee26cc6999959be9cdd9bf6eb6163b78c5e3734a8f787156263b5645ed18e61a4cd4ec7788b3d5ba5a89a9f0c616c5630260b682800371cc9a321d786bc2e2b16a0190dbe5d63593eb10f575eeddefa97d41d52143cc746ddea3973f52cd1ee72fc2df38f9126d4c63c4220f620345c000b3bbb6e767b6c44e62c0f616823a0e89088e940aca509be7e44279957deb095efbcae6d575e063b8098e9ba67c07fe95bb5ee271dfe9220c0ed212738bc5e06e17ab6f", 0xc0}], 0x3, &(0x7f0000001280)=[{0xb0, 0x1, 0x2, "51ac17d658d81e10845e5419a18b207c73892c0e643f1912157b18b50ffdfe353268928d922bfb97e8499648fe74754acd1a2402e82c8ccf885d6b8b735be2b405aa44f1c966eecf195058684077d8718c280d57922fa3727074a6b0461381bd07737a213b45f8130c95be5e8d07383b561b835f142b3d4f1d27dff6e4d151661c1db0888f4e4eddbe43e20b728bf33d86aed2e0b0afafa4cf7b10f8df"}, {0x1010, 0x115, 0x8001, "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"}, {0xb8, 0x0, 0x100, "fb226a30560873670a994829e87b11ce14fd3217f883e1d6ca9feed9dd7001949fcfc82232363ca2ed0183db252c8210254400936f40804ce7198666d095b914ef6eacd791243811b7578b9bca359456bf26420a1308bb950113ef5377c6f5b75e6d761d6c0dd7a978ef268fe1fd8c8456e8ee573e4420da65b9f49050dbb9036a275b25a36d1d83883c66cb45b7f4f0ceafe0ced9b6866dc5db4e0a2d8d3a94f840a7eaa0f245"}], 0x1178}}, {{&(0x7f0000002400)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x2, 0x3, 0x4}}, 0x80, &(0x7f0000002840)=[{&(0x7f0000002480)="1e482ca1304adddd2671ed14162b0a8638eee37f6d0ab5a20885dec6e4ec27180e0c6f01fa093da11fcda23deec8bcf4c53c1f6d1b56055e66b5c0dafdb07f34ba0edebf0b49b596eef792cc113b6ab261ff7e73260db6932fd810753115d58370aca8f74335a24950ad6fdb5094042af5474a816e639809a68a8db428449f6dfd0035f441c85e75fe3a2b26f4f67c8d0e9f481c35e11852b5b8250e6861", 0x9e}, {&(0x7f0000002540)="d2b003e7167fe2858880c3c6587f4be0be8c4a0bac5d619ad5291f7ff9f528a8c263d9389422c0aac86e2cd35855eae93681797194ae225f920d03e43d3ad1e47df4456c05c56b261e245e0e5af77f4166bd12aa832231c268b9453b549638c7a9b6e405cba225909815a6f2d85b1c0b6ae8be335c71b738b52dc966fab5f13d633734ba03", 0x85}, {&(0x7f0000002600)="be6f51d13c671c9b5a8b90826d7b684eabd26e3b809c29b5899a506a83a1aae39157bb96eb96f80ece201da57b66f726e5119df2e47d99d204813a9e4c2eeb5b9b928a46d6f314996403ca9a1c1753399d43fe5b8a9e79829d436ceb9eb9a07d0e9427fd512d1b7fcc143226", 0x6c}, {&(0x7f0000002680)="56d504ca15ced4ec8ea33e18e457144e8f57a526924387ca6e96f7f4037a86c062d2709a492c281405f4adfbf6e33d819aab8c81aa1bc42abdff818a1b43a82b7c3fca821c27d01ce0a095efef8e01bcfa090afd29741e385d68d3dc34c443098b0184de529fabd23945d1e56dcf27904e46f1f5ab079a4e2db77766c5d3a458abfd5df0f4fc05e956a06328651dfc63fc78507b932db192a2b6b055e7b4280c277ea864895bcee267d8e7b67e5cd0cfaf9e66e3d29d739766f50d6c2680688ec2159cc4aa2e89b4413a6f506782588d6914fa28c9fd6ab687b684ee4454ee3771", 0xe1}, {&(0x7f0000002780)="766eee01210866fed3d8be3621dbda32c6187e63b6a20a5ec3f1fd20563ee992d77c86e72a5e8b1f7cdcf0afd9e8a11505808035ec0c1664269beb4326a0cdd73c67c7f876178d3b29a6c4d66dd2adc02f4e571e5c50761c5f8fede30b2760b4c64a88c22bf2f3c3537ab8a665a766be7998b4dfbb29bc", 0x77}, {&(0x7f0000002800)="e1b7751f17725fc8", 0x8}], 0x6, &(0x7f00000028c0)=[{0x1010, 0x6, 0xffff, "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"}, {0x1010, 0x119, 0x401, "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"}, {0x88, 0x107, 0xfffffffa, "725a639ec0b86f1644a4058411262ad0842fd13e814a48b73bab97784259ab75b2f38b681e19d38adfc26e5d4bda9d957900b63b74a71f9d7b790313dcd72aa1e5e4f05ccbc0664f48bce99d3b7e979770203166256c2b33b554a4bde5abe8c13885b7a32c09fbf5b507a15d60190e9759"}], 0x20a8}}, {{&(0x7f0000004980)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x2, 0x4, 0x0, 0x1, {0xa, 0x4e20, 0x1, @mcast2, 0xde}}}, 0x80, &(0x7f0000004bc0)=[{&(0x7f0000004a00)="13cb3384632370a912c86bb919b54040ec668136d47b3d5f31aeadf6dda60b78458db5b56d6b3252d57430d7dae07550b80d4ae560edb0517c7b868fdf486596fc53350646e15d4c36396cd36299bdaf1cb6404397b277720bbeb344b7a434eb8e351dcaab29ca793139732e5df39788c2875a3635d57c88b8f4a78d9d3545df3ce4c87f93f87cbbd12f1d02c9c03555f9a79dcae745bedde9ef974079c7740390b811963b", 0xa5}, {&(0x7f0000004ac0)="bfe5e962410d9b2ae16a49391ae8b6a9bfede6815732f67f396de8839e6a0e1e167946e0c8bb95001af92b6a7c8e9e6a1ce79bd969e893abf3f3d4281685203a1fc340d8e7931cc3aa7696b641fa4bbc5584be65d128e503f16a0f027291f6a5336567f0098e10fd710bf1d201f084e4783a03f26f784417794e84d70c1151bf47a590ff04c922f1375d2bd7e39433262c76d9e191652a4691bbde83a85f6dc2d2aac24f4fbbe25ec2cae6260cb59ab4f2aec9f1872a3e2729bffa4a405b0d6d24bfaf57ceee1f", 0xc7}], 0x2, &(0x7f0000004c00)=[{0x58, 0x100, 0x41f, "31f7d89dd64c875fea1770379786d0af9091f0000b28bdf0dec0a00148bebfe89972693993fb68298b5c0c2a5c2dcfb5667403137535fc1c0ede048aefe75334c5fb6699"}, {0x1010, 0x116, 0x9, "998ca2f5ec6173ebbc84e1a8f53bb43d1495329693fae1a5f036bd0798609eed46bfbd4cd8d8c585e1468789678029752211b45b1b96c81c666777ef0ad96223b6d3cec429efc7a69f9bf29be86d084e69a81f95ca49b0598e3aaf42ae09c5e1f471e1c822faab4ee732cdb808c331abb9248ad1e89239aa0d1236733889c1e9af569911a14f6b90b8e59969c4fdfdc17b61f62af54e4a4a7c5fad7d5e68e2a7c76a2b8daaf5cec67dbb3f1cd1b68dfdda666427bdfb9eb9a8142a3d4a8ae7fb6886fc3e42befec3fcd9dc659d0017e0eb67ace3c7f647ec860a27172d7364e17c6f054fb2acd04672db34491050e10062ba439c91cdbe9eff764d485232e7e27fdbf74c569dceeff423ecf3098736b33f78c887bd6cf46c68785611c6f7057473698ed9345ee12764cd1fad9fd9da66614950765d6f142a24a9056c72c9c137114df31ea454b1b0d3102664d68b309519360d3cacad8d32b4bdb16be1c836c3e369c218c134c63ff7f85796dd8873ad749f65d59d4a10306f215191f8e1aac4c87dcf01689fd333f6ca68bb329d5be9cfb3470320a4c1fd875e19ffd0b5068bd279d2011bc84f3ace61d8e78050d85bebdee479128202e0183c03e4add0ba561fcb9dc15395df33eccf41a0162c1b4d25af18b81cc5665e30beac8628ed50d2c24a2a76caed02fc873bfdd6e11efa8e20a399c44afdec2c53e0fff4f9671fcf1ffcc389cdde4381f3c89000556d261c26b0d3cfea2ce9564fde3b5d2aa00d0763d00ab987c994b25d4638f6130fb6c55d0cdbf712c7594950ef2a2cd7fb07aa1bc8bd5389d3a4104732870af661b1146bd6495ab7bfcc4ce3d27120fd5486c921bc2bf99d20984ab69666a6a796064a5815ff5612a3dab775b400f0f77b75b96d32ec3eae63cff277f6abb8112257cdd67cd8ea9830bb3a9b6db9729495c012bd9d7871f3e84a609879f9016dd8036f33f10f9c4bcb22de757ea387f14632cccdcca70674bdd0e912e6f50ca8de7c737baa9c86548d3fec462342792ad716cba3bec0b90888561f44ca28718325afcb34b87420c514377f5c35b85b3ec3c5c2f94b3143ba18c369e892fdd0aa8665f936832381846b97ec961d05db8b3c688fa323ef158ee9efe62f2c44d95d4280f96f0fb3d1b0ceb61abc845e656a78f13235635c8ea4e30dcc2484383a7db9fb69645e644f214771a387957ad93ddd4431f062239ff886afc170d0c57aa83408c642e943e965918d01c20da82d9ead0a79b4e7ee33b4f4ca3e8494619fc9d2e2d602bda84aadc28df39b7d621e82d35a681bca9b7d3f49e08f4ac1d290fec42ada49cad9251e811aff1e49e5dbcaa39ce6d8f509d0d1110b19d7cc15800f64f3a76c33a2445185ee3f0b6477eeed52a344f04aac042528c136b7aede741786c1e57eebc1e15dc985dd7d5dc9f82689b0814506ba8fe9154e06e0341c39ac161fb0a1ddc444c5bdf9dba6eb77aaa164dd85c5d3457716639e84bbd7be1c07a68a8d3ebbdb0bdbf5471fa4dcb26cc6ae14434499867dbfb2cb3e56ba5a3f84640612d6ce28a78c901061ac247831a29c891a6527e7312e64c9656b1895cf4664fa6be2c4320dcbe1dcfe9fab2df01bb63b6b964ca3cbb2f943ea48fb03bc3c547368868fde01fa0e3e1b2dafc0399ad17cfd9fc011321d51d3d4262287598034e8c53e6425523c0c96c461bbe2d0e4858e4b9674c37646b7cbd09684f08d71d1eef5fbd74b1c74abc880ced7bd0cfc841e61da587150a720776536b61c891044207ac1c9344535e0625ca47021720ad7987e82f75cb4c9a82a1e57775f36d12af8e47254a3055b0bf3c48584bb0e7fdfe3ed7d48e4390196a70bc19bf81f891ed8582f625999045650e5a7fe51e8f31d712d4bff74e49331148ce9cc4d3592757a48fcb8b94b91f63227730e1698034927005d0711e3c04ffaf8f3aaf523b80796bf9e89a86c9dc6515f8371f3210caff39e8ed1d9c1f7bbc70c2ae4858b329cb0aa7a4a1e539a6914006ea6616e342d86a8cbe21e83e408da629f66ea3df3963ae05c0310327a8ef55b69a1fcc536c465d82862031dd9ebcd069427368a04ed4bd035da5e2808d3b88edd3fb18e3a7b4aa2dcea0b00103ee94d14307787dfde5b201f83a31f13351412e398d49f5c6aac3b455d47738e166fac1d7700203734b2e1485c1c7b35e3a849683d522ada6e10d1da7c2574176624ca919a04ca7273864f201f8d35bef0d5b2703989e5722d63c9a3dc677fc2c58c07938673696eb403f0190de0d2ad190f92e9b3c574bf42f6bf4fb648a260e0fd135c8f48c3ae23fac9de224cd7a0b92ba1e36b549688958c5c93e300bed03c4b0c36418dfac7963c32596adcb4b63eda6ce8dd514b3947dff44401c7dd0665a76abac9e6e5d33b3f5c77f389aa13f569878718988dda7cb19f0843353e9743f46173ff7142293130489d5b70cffeb5ea6db2c21751414058e11cd8a510224bbe0089e1fbeee2aee4d132bbeb060e4e5917fdd56912585bdcfae130b5c071e70a3b346af155d44430eba06ab0838025dad1680048e5a5c57f48560cd3623201b43fcd58cac3fbc8630ca92599991fdfe6f2a24ea6014f91d461a89170355635560c698dc29a2a92a72593d7219c5f24213178b5f97d40073386e775c2a97bd838670949ea969eb8276913f2bca4ae53a58297179dc8a291107711c25b4d6d48c5ec3cdb8bdeb460eebcbeed7d05152021f30a882a811839c48731ce4e70e6cacac4393613e3c1b390dcacfe4c59d4398d1a79d161ea2ffa3b9d6489d64afa0eed5d327c3c5095703b4f29b0b0d205e8a277d266207df11ccfbf19761c678ac6c21551374d49edf1ebd32b3b2c3f79364c2da7ea4f301c6956afb3503ed00ee9b1f97ee7125ca9923c38fef1632f4f664274dc303028193a1d594ea487896f4d2c6ff89f8b4dd2f195b522b434db36eb8f927e7fe7053f466b40f6b426aad7092dfb221ad585e0abb2f4e44bb0846a6a4739a43e2c1e05d6ceec82da4bb0b2cfd13fa879d530b1f2e97ce204f1f78d2321a0a45b73c505ae8901e53867d40ad21e361c9ce2103c29e130979ff71a3e43fa3526c6c1fd0b172a9199256c3fcba128b4797df199361b29dd9412a1fc8af65cb478feaad226b772df93f5a0ac3ad14ce9aac194100d29c31ac0b060770326afd1c98713c4e622cdcf33296f800f50f5d9b86061e8142e4f2929f62bd2a56533abf3a2838691cde530d4f31833a521a107f68ed0226b5bc5cda33dfb52c5787139121675edd85a32447c3430fa7243c7b5744d73595a4982bab4be73863f5abade310ff1cc8d2bd2b28dc8c55726f5eb19737a6dc9b323179dfbe2bb35f931212ad08c2d2de1bca69324990c216b74a57ca49693016336c26e57325ecbd68da13940f05e7bf5313b3f88b56723f94162eff96f1f6e8e68bb32267fd286b3f1c5c084c39e32a2118a8ac207d44d4f944f64c2e861eb90b33dbd69bbc2cc64edd2a06972fa32a169a1115356bc1cd5c35d66fd6395498a4d2186d24f994f00df54e401478a37a21ea1d5dc1cfecdbfc813ecad5565c824d5de8bbcb12f84a13043ff61e3e27a21d9b680f77867129d702a6ce10686443921a9922e204ded6c323b1ad85878ff1da7f92a567a87f661b2d6a3b54e670a5e14a95bf42c0735e314ba9a1c95cb65762a089b31d125fe4c01700c167e59debe79fefeeeba083f8d73229304c3aa89320ad3cbee3ab2ca1eab2b9f11e3e9d6c01df4a58588c95c88ade982add4bfac3b81901012debbcd1902fd99d9cb3d316c8be65ef4bd909d0f89d3e16ee0745eb4f9a8b1e74d29aa90e0ede8db59497ede54056fd6728b3fb897cdf3a2ef0767c25ea0bf97b46b759c352d7b1a3fa3ac258ae58415444e4940f66301c170289af8144e07bf3923a4211f157080e358c661844e3874d4363c10bafd39b26e5271e04f6678b128f1fb26c9e5bc7d537c18964bb74b929875f108fa25a36b8cd8acfcac003c87cfcd88bfb81ce5dc6d688629e1c2b9dab7f18b1c1084a02ac8124e2c2be3dd8564ac1685d8ed73fb7d7de093c55332925ca4cb6480ac63af9a05eaaca3a9d3f206edad602f7a1821d5e616e5f8d87708ea8d784290e43eb586d0c230f26170d9b6833b9f50635dcf212e19f6bd3b45cf8665fb28d3e12fa9ca97cb5d3f3e7426b914b792faa2475bdcaa2882cb96a493a28222dbb10abe7508872a3a84e72908e294f6b45e14728a35f06b9d85ccf7f1f68041033d6f6d6c79ba98dd60c96e3a7c68488ba3e55d70e1dfb603b347758691c0d796e7e09a341e15fad7eb0e103f492286d15f1ec0211459e3251d0dcf3374f455e8f96a4f2f77851d82385c0aa24fb54ab56560220601d563f91d33d38c211ece68139c1d2d66a40ba4cab69fd6d884b1532ffd31f5909037230bb79f8eb5e94e46c8d84f56ddf89fb94a464babf96e413c8eec8e6935de3f0b5536d7f33ff459e09b4952709ad503bedf222ff190e0ee2b1934998d1d902fd6da4e569de0ec66505aeb80f29a86a444ff586d16f484b1fd98e0f7ae03a956445b3d2c2e2ef8a22ab48ea70b0666dd32559685df466ca1cd07501ca25ede47482f2a6db2d13f1da49de0c1474ae22bec2e95dfd6adc3994400d74938aaaa2724c4bfbd2bca1a77d15f84543ee53f94b0ac642ec2af3b50b883d0bbf47d9cf44edc5be583cb88db1d9f53c0af297b1c41c6dca5849fe9918b1574848ed224aaa868bc714ff098f641186622932e9bce774825f20cb0c540ed7e831d00862c058ff3022b730c15946b5168b09f48017087898368c87fb00f182b8555a2d3f68eea7095d9e321eb763b6131571a42e1dbeb0c92bea6c1c8b312fc8126bfd921fee48098fde6e21cfdffafba5e62a06bbd5abab7d4bb4af6713f3ecde6fe6f7b1a6a9732ebc9bac0e832aafb8f92b3ee55f9ee2e2f331cdc59d1a5cdaf7cf11d4cd60bcc9f6f6cbeaf32b14606a373200e3aa9a00324350dde6d08faafe27564d9e9287365653ba8eb6d25308013d07507666239e6774082ac7274a6e031e90dc1604750f8d145d21701c34245c37ba8d778360663c818c23c393111ddf6a09419a10ebecd9b04e1edcefb82e1fe496b020b71d6f6eeb83923992776d70373e59f81bebdab84cc875b27cd18b83c168104f19e0442759692e6f38a118ac4f92b278d9459b7ddbdd59808827ab4cd28f178c6477b3728996ca0db9b843759f0a5dbf91edf1edfc49030c6ae19ae8d63e4c6c89b1f6ed66a936f2dfce0afeff3d88ec8115a4589a4983d3a188d24c4f60f3464b0e2dee438fbfc771e3865c471f2f9ab30c5226f2775bcf41bf73d4a51f4db2bf93abe30505beac9664bd42334a2f7e989003de4109b5e395888ec4a6919a8d84295895ae9eda5844d1dde84bc26ba63a38e681570e2ad61011cb1e698c64017f6cc303e3ee6a01f52dfe4a3a2c3f006a2a4b835073567da19f25828d8cc804737ee947b5e9e25eea544bb8ba8708fc6cb2f01c108300b821e7cb4bc4307954be6ed7f5bc01c40dff7890c35d90ad0e04c83870dfd71b085474ac1b33f166ded6a39de56c64e60ae7d070987f1d29ae083b8cb28c18fadb942be1866f4be1d231e11eccfa4047eaf4acc1a34b96974b9cbc6937bebffffc096ac80f7f0635f184b7a22c539b3b068c06d30f8bb84faa5fa89c6ffcfaf375da87653a7a64cde063dee6ce438da87b87642b6176b50d95cc4f620a04c4e5b9983c5ae748ff1fcb1a05dbb"}, {0x98, 0x10c, 0x7fffffff, "3f0b2d5f441ad21f4f7fddaf92721120a992d3c284f1c9b4522fb098a303e49d4be4963c9dfdee185166598357c4b0fe9aa7a6c8ed43e6a26fd4c9d5cd8cb2b5a8ba9c53d0244a0c4b1e26578b01b0d7f200b1a74244b5a27f29fead9eca0567dc9cdebec42dd81e03213d4c88deb08306e6b04c9fcf3aabe1962541614859b77cab37d4"}, {0x1010, 0x10a, 0x9, "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"}, {0x20, 0x107, 0x8a8, "1eea451e16905441154fa87ef160d5"}, {0xe8, 0x111, 0x9, "a36275b30491554f12add0c623bae686a3cce2b313d7db7d65db96b580990060e225147982ebba9feee56f10570719a0b07367e54a282e170fd260b7779f8051513aa66a8eecc8b433273285af46fd8433f209aad17d68c9459f3714757b0842eb68e4a7b89b39b390ef7b080da56d7d8d7319e7462770894b19b28dd6e588c13c981dd5c8b6fed29e477476ecb7a951d795c5631a7a73c3224b5aafb17131800afbb9f349c188f0575d2a142d4d7425914a85ab0e0f705e40fdf4dc65b93959990bf4816c303375c6d1f215b77d46fbee0b6b3c1d2b"}, {0xc0, 0x110, 0x101, "a3be082990ab56334fd488248a3eb56033598ee4b72d6b0bfdbf584adde5d3cdc743ff7457b7ff17addb2ffe1526c4f5d1d094807e78fb2c6e15794d2f870108e17a62f9a514f85148c932f78220bc6004155c36a9727de603cbe39557f547c7332948186677c00decfc7fd0bdd8b9fe1faedbdc7333863ff244f720683509b01df22311fa5975ab2865bfb0b35ed2d59adc1d4f2c248eb3d1e60cbbe410aa8f38184dbc7a4831209678bd47"}, {0x80, 0x10a, 0x34, "aa5c7dc7dae57e6b6188150251ae3a9a575ff25c249a35d35b03b1967abe370cc5df0ae611433caf15f086c058d9ca323be8533401757252844890df421f4592dd222758006e3ffcfd7a418867aa657d1c4b53574e8fad991841c0eedf65e638d4c160f3b4aad59a0bda77b3"}], 0x2358}}, {{&(0x7f0000006f80)=@llc={0x1a, 0x0, 0x4, 0x5, 0x8a, 0x1, @random="3cdda144c4b3"}, 0x80, &(0x7f00000077c0)=[{&(0x7f0000007000)="8ea2308b552e847d5acbfd72c55454635a3fbce804a0726c5494b89cfd932025aaa69ec6b894ff600cc07dbf3f9b0a6da7613a2eb22340302c86e0560516fe", 0x3f}, {&(0x7f0000007040)="02eb6431cafe8e60340c60", 0xb}, {&(0x7f0000007600)="f7bfdfdaa29da862c62017b24123284538d2620c4ea31ed52d8d23dc5834babe7151e618d783a98747e9fe0d20a271b161ec1b5b0e9d960ebaf286a9f5abec70eb257ca8be3e6ab902ddc18eaf599894f3e7deb1f8d21afc19c8f12327a8f909284189b6c9575b75d04cbeceac8d6562c324e6b559e43383e21ada5c0338e7934a3b4c25ea06429e109a6098672f29295cfe59db70d1b235c26c48d719e6c719542a6e3c2036d61d7c5a747ed2f1c5b4a35728f63f471a32d4ffc01daf51598714", 0xc1}, {&(0x7f0000007700)="6c2751bb9cba523a9ffa8ab117310f498afff83753c5b21f6a7ec669ff6d37395d41c54b08970a608df88cad9ab166a6b963567ee8d8e75f1f72cd559135b3419ced463eb959f28d5d7efdeb80a0e793290e1d0c902bc92a97a7ea53b44b5914892436bf560e5a1a6455df0d30bcbde825a22b67cc628c5bc55b600c595580b2639df475e4d1438acc77717fc9e472143a2127e3c4b33280852a92dc96cb292126cf3f978a7139d7c11e415cd4371a48366378e9de595bedbd", 0xb9}], 0x4}}, {{&(0x7f00000070c0)=@hci={0x1f, 0x3, 0x2}, 0x80, &(0x7f00000072c0)=[{&(0x7f0000007140)="82417cd4891b92d80d183d980503d3ebb6e6c5c658a01ff159a37b4b0dd8871532067dcc974d71aecddbfa9e10031a7b139fea490baeb314d28478649eb656975b17f649a4f27dbf12cddcf63e0e90274dfe8fb2e066b909cad9d0a9d804055f18f4b54c8af5c02dcebc85d7598b668c610349de", 0x74}, {&(0x7f00000071c0)="4c020ed41946f55b4619eae811f1e4cd", 0x10}, {&(0x7f0000007200)="d901be154c2aa9299eec6b99a31898862423d312bb6528683b4926c62de93da0bc06c04ed44a5d571428b1fe4c474d79dea10fa0f04292842a99bfa0b55b56defd0a7e736509b80956170cd82b9a6f9a20946c570cff46a4bea927b34f6b7f632e65a813e466c72b6f1286b27dd592a081e0ccf688fcab52714b6b020dcaa8be451ba25cb73bbd9aa8f39497088e57ded51651042381c69359f9", 0x9a}], 0x3, &(0x7f0000007300)=[{0xe8, 0x109, 0x6bc, "414275d66d7d8e5870e59df69862cb0ed8bf8099208e69890e2eef6fe518913f7bc489f67d5981a622bf358a255f24089f4c10168791b3b62843668d751b466387244d201f2ae1200d2de66a3ef77e07164388f057e8201755f60a4bcdda42c2dc2420b506249c4e73109a94ba896bbe31fd77c53ff0879362cf1035a6b1cfe5afa4e3783c94ef4bb35a66160a4b37790fe9d30ea7412e8976aaabcaba45361172952a97fbfe02076326b05d752fad1fc90fb83478977f28e4956149dce7e9835d16ba9797bff1d096346812ea44863a10f977d129f6fa"}, {0x18, 0x102, 0x3, "07ffa0"}], 0x100}}], 0x8, 0x80) [ 3504.513319][T20816] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2835 sclass=netlink_route_socket pid=20816 comm=syz-executor.4 [ 3504.513658][T20808] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39006c002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130c034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390068006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390074002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:38 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x49}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace(0x8, r0) 06:27:38 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) 06:27:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39006c006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3504.641942][T20834] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3504.654359][T20834] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3091 sclass=netlink_route_socket pid=20834 comm=syz-executor.4 06:27:38 executing program 2 (fault-call:3 fault-nth:18): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39007a002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3504.692987][T20834] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3504.705397][T20851] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3091 sclass=netlink_route_socket pid=20851 comm=syz-executor.4 06:27:38 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) close(r1) 06:27:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130d034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3910c1002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3504.754590][T20858] FAULT_INJECTION: forcing a failure. [ 3504.754590][T20858] name failslab, interval 1, probability 0, space 0, times 0 [ 3504.767234][T20858] CPU: 1 PID: 20858 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3504.777395][T20858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3504.787593][T20858] Call Trace: [ 3504.790869][T20858] dump_stack+0x137/0x19d [ 3504.795200][T20858] should_fail+0x23c/0x250 [ 3504.799654][T20858] __should_failslab+0x81/0x90 [ 3504.804434][T20858] should_failslab+0x5/0x20 [ 3504.808949][T20858] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 3504.814672][T20858] ? __kmalloc_node+0x30/0x40 [ 3504.819371][T20858] __kmalloc_node+0x30/0x40 [ 3504.823890][T20858] kvmalloc_node+0x81/0xf0 [ 3504.828392][T20858] alloc_fdtable+0xae/0x1b0 [ 3504.832982][T20858] dup_fd+0x548/0x6e0 [ 3504.836975][T20858] copy_process+0xb70/0x2e00 [ 3504.841553][T20858] kernel_clone+0x14b/0x680 [ 3504.846185][T20858] __se_sys_clone3+0x194/0x1d0 06:27:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007700034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3504.850953][T20858] ? __cond_resched+0x11/0x40 [ 3504.855662][T20858] ? perf_trace_sys_exit+0x4d/0x160 [ 3504.860912][T20858] ? fput+0x2d/0x130 [ 3504.864795][T20858] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3504.870857][T20858] ? syscall_trace_enter+0x153/0x290 [ 3504.874840][T20872] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=20872 comm=syz-executor.1 [ 3504.876170][T20858] ? exit_to_user_mode_prepare+0x65/0x190 [ 3504.876196][T20858] __x64_sys_clone3+0x2d/0x40 [ 3504.899559][T20858] do_syscall_64+0x4a/0x90 06:27:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390002002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390074006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3504.904018][T20858] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3504.909911][T20858] RIP: 0033:0x4665d9 [ 3504.913848][T20858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3504.933520][T20858] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3504.941935][T20858] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 06:27:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390003002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3504.949896][T20858] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3504.957862][T20858] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3504.965837][T20858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3504.966521][T20869] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3347 sclass=netlink_route_socket pid=20869 comm=syz-executor.4 [ 3504.973794][T20858] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) fchmod(r1, 0x181) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB="40010000100013070000000000000000fc020000000000100000000000000000fe8000000000000000000000000000bb00"/64, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000100000005000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000800160001"], 0x140}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) [ 3505.002799][T20864] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:39 executing program 2 (fault-call:3 fault-nth:19): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39007a006400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:39 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390004002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3505.076883][T20891] FAULT_INJECTION: forcing a failure. [ 3505.076883][T20891] name failslab, interval 1, probability 0, space 0, times 0 [ 3505.089602][T20891] CPU: 1 PID: 20891 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3505.099794][T20891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3505.109836][T20891] Call Trace: [ 3505.113106][T20891] dump_stack+0x137/0x19d [ 3505.117577][T20891] should_fail+0x23c/0x250 [ 3505.122031][T20891] __should_failslab+0x81/0x90 06:27:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390005002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130e034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3505.126790][T20891] should_failslab+0x5/0x20 [ 3505.131278][T20891] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 3505.136992][T20891] ? __kmalloc_node+0x30/0x40 [ 3505.141686][T20891] __kmalloc_node+0x30/0x40 [ 3505.146184][T20891] kvmalloc_node+0x81/0xf0 [ 3505.150594][T20891] alloc_fdtable+0xae/0x1b0 [ 3505.155116][T20891] dup_fd+0x548/0x6e0 [ 3505.159100][T20891] copy_process+0xb70/0x2e00 [ 3505.163699][T20891] kernel_clone+0x14b/0x680 [ 3505.168281][T20891] __se_sys_clone3+0x194/0x1d0 06:27:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000036400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3505.173145][T20891] ? __cond_resched+0x11/0x40 [ 3505.178002][T20891] ? perf_trace_sys_exit+0x4d/0x160 [ 3505.183207][T20891] ? fput+0x2d/0x130 [ 3505.187100][T20891] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3505.193173][T20891] ? syscall_trace_enter+0x153/0x290 [ 3505.198502][T20891] ? exit_to_user_mode_prepare+0x65/0x190 [ 3505.204296][T20891] __x64_sys_clone3+0x2d/0x40 [ 3505.208999][T20891] do_syscall_64+0x4a/0x90 [ 3505.213410][T20891] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3505.219393][T20891] RIP: 0033:0x4665d9 [ 3505.223377][T20891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3505.242983][T20891] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3505.251437][T20891] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3505.259397][T20891] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3505.267358][T20891] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:27:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390006002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3505.275320][T20891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3505.283382][T20891] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3505.306078][T20887] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=18432 sclass=netlink_xfrm_socket pid=20887 comm=syz-executor.5 06:27:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000056400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390007002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3505.320305][T20901] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3505.338965][T20901] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3603 sclass=netlink_route_socket pid=20901 comm=syz-executor.4 06:27:39 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r1, 0x0) [ 3505.385797][T20901] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:39 executing program 5: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0xc03a0, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000080)="047dad47ca63bd7ec5a6700c1c8cf30918e893a75b50165326731bab00"/43, 0x2b}, {&(0x7f0000000180)="e79a58f286a11af94ce7defdce1bdca8af9e1ffe24c0ce66702083ea868429d88b687658e374af2733632efe04b9bcbbb63df077a632a8e6ee7a3076cf860e7e6f4da1ec8989e725570e958a69bbed61bece42109820b93a13872775ce5d010000000000000087c8f42f7466b94759c65eca39891f6befc86604f675402ae34767ad34481e24a24ee9c3f2718efbda499cafa973e615517eb138117bc241cfc4a4ffa419", 0xa4}, {&(0x7f0000000a00)="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", 0xff0}, {&(0x7f0000000480)="9490278ecd5087a3331586f9bdc410cd111057ad1c560ddb838cce015f9ccd0f889fe1f4bfcadab6395ca5be180f1fb6899b0122eaeb4a1eca0f90f4b106c1b4692d5bc56cc21b8f281c83c6e7f10cdd595fe392f7c762fe9405ee99c86538e6944044f5046d309b40dad0031e86335cd5fe501f713d4ee74767ea3d6ebebeabceb5847256b80802b6d72bf205008fe4c57432fd6113fa77d291bb7d694dbb0b85ca714a1162a7f916ce4628ba20a9eb4576b7794a615afbbe3c648da69768", 0xbf}, {&(0x7f0000000240)="6bcc556c40b802c8826b5ad41ab497dabbf96306c4e558c444fc7a9e8da605308a94a6e23c5a5c4bfaf51075a04dbe72542b8ffe7c8c809e09dd79deec039e9b6f19e74f9f116b625c9df57a7d5ec80d4041ef44e8e9f57c193994c3e9bac9b31888cd7bcdc2a9049b75cfdc5b5d882b59ee5aeea5055abc299817454d205620b45e13458bfde759b8f8a28d39357b8f0ed1172a72de82a300fe82", 0x9b}], 0x5, 0x5, 0x6) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r3, &(0x7f00000009c0), 0xd4ba0ff) sendfile(r2, r3, &(0x7f0000000040)=0x5, 0x7) close(r1) 06:27:39 executing program 2 (fault-call:3 fault-nth:20): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000066400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:39 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r1, 0x0) 06:27:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390008002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001310034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3505.493265][T20931] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3505.505270][T20930] FAULT_INJECTION: forcing a failure. [ 3505.505270][T20930] name failslab, interval 1, probability 0, space 0, times 0 [ 3505.517892][T20930] CPU: 1 PID: 20930 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3505.528111][T20930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3505.538197][T20930] Call Trace: 06:27:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000076400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390009002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3505.541485][T20930] dump_stack+0x137/0x19d [ 3505.545851][T20930] should_fail+0x23c/0x250 [ 3505.550265][T20930] __should_failslab+0x81/0x90 [ 3505.555112][T20930] should_failslab+0x5/0x20 [ 3505.559621][T20930] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 3505.565334][T20930] ? __kmalloc_node+0x30/0x40 [ 3505.570006][T20930] __kmalloc_node+0x30/0x40 [ 3505.574505][T20930] kvmalloc_node+0x81/0xf0 [ 3505.578917][T20930] alloc_fdtable+0x112/0x1b0 [ 3505.583499][T20930] dup_fd+0x548/0x6e0 [ 3505.587536][T20930] copy_process+0xb70/0x2e00 06:27:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000096400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3505.592143][T20930] kernel_clone+0x14b/0x680 [ 3505.593140][T20931] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3505.596744][T20930] __se_sys_clone3+0x194/0x1d0 [ 3505.596769][T20930] ? __cond_resched+0x11/0x40 [ 3505.614277][T20930] ? perf_trace_sys_exit+0x4d/0x160 [ 3505.619473][T20930] ? fput+0x2d/0x130 [ 3505.623363][T20930] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3505.629482][T20930] ? syscall_trace_enter+0x153/0x290 [ 3505.634760][T20930] ? exit_to_user_mode_prepare+0x65/0x190 06:27:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001311034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3505.640470][T20930] __x64_sys_clone3+0x2d/0x40 [ 3505.645137][T20930] do_syscall_64+0x4a/0x90 [ 3505.649565][T20930] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3505.655511][T20930] RIP: 0033:0x4665d9 [ 3505.659397][T20930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3505.679010][T20930] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 06:27:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000a002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:39 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r1, 0x0) [ 3505.687419][T20930] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3505.695435][T20930] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3505.697340][T20947] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3505.703399][T20930] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3505.703415][T20930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3505.703428][T20930] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:39 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = creat(&(0x7f0000000040)='./file0/file1\x00', 0xb) write$cgroup_type(r1, &(0x7f00000009c0), 0xd4ba0ff) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40485404, &(0x7f00000000c0)={{0x1, 0x0, 0x0, 0x3}}) r2 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file0/file1\x00', 0x1f, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000140)="6cfa4e7e964eef6a1b85d70bdb74fd8c54158a5b016774b8a57ef9901970261e5c5ddc3f65b98cad2c5129a5ef8241e636354f56eae8b907110c47d0d9d0cb15c31c5eb6a02e386956e02136d17acef22798c9f443aef31a6244941fa625880e719576fa2832ee6a6c74c09749c83bc2e77aefcb9cb165a00963b962dcf743a3ff673da62ab257aa2b8767a4c12b8c30d626ed6ce143aaf83dc183337005ba0ecbf82ae1bd553c3e9565a82b8a7acd393bfda568fba31d9073b449d745a15450dd9383cac17b493a2db42fea39e7e7a0d559e2676bd2bf3aee", 0xd9, 0x1f}, {&(0x7f0000000240)="50af95f1013c7b0259d6b9746b452245e36ffbe86d76a217202ff2c2ca02fe80fdc76f324fab4b6433e289429b1d8e0830f5f104b9948064f2ea954da5efca8c6477979555530e9a3187", 0x4a, 0x2}, {&(0x7f00000002c0)="fbc549c6eee3c1a13500a4d703d351a82880797f6ee3f3b3aa02c5b2b8265796bab6da3a4b0364358605d3ef6484ea9d53969dcb82dc9c7d2dd769da273a811f82267f4c5ca1f4c7a1dbf4a8d80f4637a4e3a04865c3aa349e7fe6d3e840bcba91face8e4eec53e4503bdf4993d809ca2312687b616010138eb84670e4cc89644737ea0b77f9c75da2208127801fe496763aa6f58df1112ced3eb2fbae88ed7ef3cd251ce433ad1f99ce44f597db30f732bba88bc71ebc6afd6cf1692704df412d14fd0af62a17a470077cb7ff12f42e19", 0xd1, 0x6}, {&(0x7f00000003c0)="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", 0xfb}, {&(0x7f00000004c0)="d5b6f3fcb75d29bdee754416d7ff404a6880ba4b1ec01f305ad8c4ade96f2d78a50a8fbbb4112a08b478137f601dd02e9475debad3e5b48ede65b0eb25341e9f371bbbad6688bfedcab73d54c771b7246df50f1d8f7de95131ac282a5c9c1c1232372d28e36bc831c13ac5bbc3c5055fa0f22ad1de85de34105e640b325d63dfcc4a8545551287cd02a1103a4f009a5cfb20ae2fb5871e9c0c0b8b4c25b47ed2210323ee9c592936fa7f3b4964938f88ba6e565bc9f594ab9d885f7a232307238e68906498c4a90dc682f56cb35b399b1334535632b393d370050aa92449f2efb96a96b6d0578f783373", 0xea, 0x1}], 0x800, &(0x7f0000000640)={[{@init_itable_val={'init_itable', 0x3d, 0x7}}, {@abort}, {@sb={'sb', 0x3d, 0x1}}], [{@subj_role={'subj_role', 0x3d, '/dev/snd/timer\x00'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}) fcntl$lock(r2, 0x5, &(0x7f0000000700)={0x2, 0x2, 0x5, 0x4, 0xffffffffffffffff}) 06:27:39 executing program 2 (fault-call:3 fault-nth:21): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000b002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000a6400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001312034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:39 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, 0xffffffffffffffff, 0x0) [ 3505.823543][T20960] FAULT_INJECTION: forcing a failure. [ 3505.823543][T20960] name failslab, interval 1, probability 0, space 0, times 0 [ 3505.836196][T20960] CPU: 1 PID: 20960 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3505.846342][T20960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3505.856426][T20960] Call Trace: [ 3505.859695][T20960] dump_stack+0x137/0x19d [ 3505.864028][T20960] should_fail+0x23c/0x250 [ 3505.868436][T20960] ? copy_fs_struct+0x2e/0x130 06:27:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001316034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:40 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = epoll_create1(0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0xa000000a}) 06:27:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000c002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3505.873193][T20960] __should_failslab+0x81/0x90 [ 3505.878279][T20960] should_failslab+0x5/0x20 [ 3505.882773][T20960] kmem_cache_alloc+0x46/0x2f0 [ 3505.887537][T20960] ? dup_fd+0x4bb/0x6e0 [ 3505.891749][T20960] copy_fs_struct+0x2e/0x130 [ 3505.896442][T20960] copy_process+0xc30/0x2e00 [ 3505.901340][T20960] kernel_clone+0x14b/0x680 [ 3505.906011][T20960] __se_sys_clone3+0x194/0x1d0 [ 3505.910789][T20960] ? __cond_resched+0x11/0x40 [ 3505.915576][T20960] ? perf_trace_sys_exit+0x4d/0x160 06:27:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001317034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000b6400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3505.920841][T20960] ? fput+0x2d/0x130 [ 3505.920863][T20960] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3505.920964][T20960] ? syscall_trace_enter+0x153/0x290 [ 3505.921050][T20960] ? exit_to_user_mode_prepare+0x65/0x190 [ 3505.921070][T20960] __x64_sys_clone3+0x2d/0x40 06:27:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000c6400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3505.921103][T20960] do_syscall_64+0x4a/0x90 06:27:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001318034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:40 executing program 2 (fault-call:3 fault-nth:22): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:40 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 06:27:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000d002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000d6400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3505.921141][T20960] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3505.921166][T20960] RIP: 0033:0x4665d9 [ 3505.921195][T20960] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 06:27:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000e002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:40 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, 0xffffffffffffffff, 0x0) [ 3505.921227][T20960] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3505.921298][T20960] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3505.921311][T20960] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3505.921324][T20960] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3505.921337][T20960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3505.921360][T20960] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3505.971965][T20983] 9pnet: Insufficient options for proto=fd [ 3506.103798][T21003] FAULT_INJECTION: forcing a failure. [ 3506.103798][T21003] name failslab, interval 1, probability 0, space 0, times 0 [ 3506.103825][T21003] CPU: 1 PID: 21003 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3506.103844][T21003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3506.103853][T21003] Call Trace: [ 3506.103860][T21003] dump_stack+0x137/0x19d [ 3506.103882][T21003] should_fail+0x23c/0x250 [ 3506.103903][T21003] ? anon_vma_fork+0xb1/0x2b0 [ 3506.103922][T21003] __should_failslab+0x81/0x90 [ 3506.103955][T21003] should_failslab+0x5/0x20 [ 3506.103969][T21003] kmem_cache_alloc+0x46/0x2f0 [ 3506.103987][T21003] anon_vma_fork+0xb1/0x2b0 [ 3506.104007][T21003] dup_mmap+0x49c/0x9c0 [ 3506.104025][T21003] dup_mm+0x7c/0x210 [ 3506.104040][T21003] copy_process+0x1203/0x2e00 [ 3506.104056][T21003] kernel_clone+0x14b/0x680 [ 3506.104145][T21003] __se_sys_clone3+0x194/0x1d0 [ 3506.104162][T21003] ? __cond_resched+0x11/0x40 [ 3506.104179][T21003] ? perf_trace_sys_exit+0x4d/0x160 [ 3506.104199][T21003] ? fput+0x2d/0x130 [ 3506.104214][T21003] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3506.104256][T21003] ? syscall_trace_enter+0x153/0x290 [ 3506.104360][T21003] ? exit_to_user_mode_prepare+0x65/0x190 [ 3506.104378][T21003] __x64_sys_clone3+0x2d/0x40 [ 3506.104393][T21003] do_syscall_64+0x4a/0x90 [ 3506.104411][T21003] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3506.104465][T21003] RIP: 0033:0x4665d9 [ 3506.104478][T21003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3506.104493][T21003] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3506.104534][T21003] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 06:27:40 executing program 2 (fault-call:3 fault-nth:23): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000131e034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000e6400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390010002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:40 executing program 5: r0 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r1, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xfffffffffffffee0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) 06:27:40 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r1, 0x0) 06:27:40 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r1, 0x0) [ 3506.104565][T21003] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3506.104636][T21003] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3506.104647][T21003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3506.104659][T21003] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3506.449153][T21027] FAULT_INJECTION: forcing a failure. [ 3506.449153][T21027] name failslab, interval 1, probability 0, space 0, times 0 [ 3506.461960][T21027] CPU: 0 PID: 21027 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3506.472108][T21027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3506.482155][T21027] Call Trace: [ 3506.485424][T21027] dump_stack+0x137/0x19d [ 3506.489751][T21027] should_fail+0x23c/0x250 [ 3506.494246][T21027] ? copy_process+0xe7e/0x2e00 [ 3506.499185][T21027] __should_failslab+0x81/0x90 [ 3506.504077][T21027] should_failslab+0x5/0x20 [ 3506.508572][T21027] kmem_cache_alloc+0x46/0x2f0 [ 3506.513348][T21027] ? copy_process+0xd29/0x2e00 [ 3506.518114][T21027] copy_process+0xe7e/0x2e00 [ 3506.522786][T21027] kernel_clone+0x14b/0x680 [ 3506.527329][T21027] __se_sys_clone3+0x194/0x1d0 [ 3506.532179][T21027] ? __cond_resched+0x11/0x40 [ 3506.536963][T21027] ? perf_trace_sys_exit+0x4d/0x160 [ 3506.542174][T21027] ? fput+0x2d/0x130 [ 3506.546092][T21027] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3506.552162][T21027] ? syscall_trace_enter+0x153/0x290 [ 3506.557632][T21027] ? exit_to_user_mode_prepare+0x65/0x190 [ 3506.563388][T21027] __x64_sys_clone3+0x2d/0x40 [ 3506.568132][T21027] do_syscall_64+0x4a/0x90 [ 3506.572578][T21027] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3506.578469][T21027] RIP: 0033:0x4665d9 06:27:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001322034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390011002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000116400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001324034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000126400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3506.582355][T21027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3506.602087][T21027] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3506.610513][T21027] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3506.618491][T21027] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3506.626458][T21027] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3506.634440][T21027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3506.642476][T21027] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:40 executing program 2 (fault-call:3 fault-nth:24): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390012002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001325034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:40 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r1, 0x0) [ 3506.705801][T21058] FAULT_INJECTION: forcing a failure. [ 3506.705801][T21058] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3506.719043][T21058] CPU: 0 PID: 21058 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3506.729281][T21058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3506.739426][T21058] Call Trace: [ 3506.742708][T21058] dump_stack+0x137/0x19d [ 3506.747168][T21058] should_fail+0x23c/0x250 [ 3506.751727][T21058] __alloc_pages+0x102/0x320 [ 3506.756372][T21058] alloc_pages+0x21d/0x310 [ 3506.760802][T21058] __get_free_pages+0x8/0x30 [ 3506.765423][T21058] pgd_alloc+0x1d/0x140 [ 3506.769602][T21058] mm_init+0x2df/0x470 [ 3506.773667][T21058] dup_mm+0x68/0x210 [ 3506.777552][T21058] copy_process+0x1203/0x2e00 [ 3506.782224][T21058] kernel_clone+0x14b/0x680 [ 3506.786719][T21058] __se_sys_clone3+0x194/0x1d0 [ 3506.791480][T21058] ? __cond_resched+0x11/0x40 [ 3506.796154][T21058] ? perf_trace_sys_exit+0x4d/0x160 [ 3506.801343][T21058] ? fput+0x2d/0x130 [ 3506.805313][T21058] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3506.811503][T21058] ? syscall_trace_enter+0x153/0x290 [ 3506.817200][T21058] ? exit_to_user_mode_prepare+0x65/0x190 [ 3506.822901][T21058] __x64_sys_clone3+0x2d/0x40 [ 3506.827588][T21058] do_syscall_64+0x4a/0x90 [ 3506.832025][T21058] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3506.837926][T21058] RIP: 0033:0x4665d9 [ 3506.841890][T21058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3506.861571][T21058] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3506.869961][T21058] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3506.878021][T21058] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3506.885985][T21058] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3506.893941][T21058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3506.901894][T21058] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:41 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r2 = fcntl$getown(r0, 0x9) wait4(r1, &(0x7f00000000c0), 0x80000000, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000380)=""/4096, 0x1000}], 0x1, 0x5, 0x0) r3 = getpid() sched_setaffinity(r2, 0x8, &(0x7f0000000100)=0x2000001000baa) tkill(r3, 0xb) 06:27:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000206400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390025002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:41 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001348034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:41 executing program 2 (fault-call:3 fault-nth:25): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000256400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3507.408237][T21081] FAULT_INJECTION: forcing a failure. [ 3507.408237][T21081] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3507.421534][T21081] CPU: 1 PID: 21081 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3507.431869][T21081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3507.441911][T21081] Call Trace: [ 3507.445182][T21081] dump_stack+0x137/0x19d [ 3507.449515][T21081] should_fail+0x23c/0x250 [ 3507.453951][T21081] __alloc_pages+0x102/0x320 06:27:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000134c034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900a8346400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:41 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390048002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3507.458538][T21081] alloc_pages+0x21d/0x310 [ 3507.462956][T21081] pte_alloc_one+0x29/0xb0 [ 3507.467366][T21081] __pte_alloc+0x2f/0x210 [ 3507.471697][T21081] copy_pte_range+0x128e/0x1460 [ 3507.476554][T21081] ? __alloc_pages+0x194/0x320 [ 3507.481350][T21081] copy_page_range+0x5da/0x8e0 [ 3507.486116][T21081] ? up_write+0x25/0xc0 [ 3507.490265][T21081] dup_mmap+0x6ab/0x9c0 [ 3507.494421][T21081] dup_mm+0x7c/0x210 [ 3507.498349][T21081] copy_process+0x1203/0x2e00 [ 3507.503037][T21081] kernel_clone+0x14b/0x680 06:27:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000486400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3507.507533][T21081] __se_sys_clone3+0x194/0x1d0 [ 3507.512287][T21081] ? __cond_resched+0x11/0x40 [ 3507.516957][T21081] ? perf_trace_sys_exit+0x4d/0x160 [ 3507.522243][T21081] ? fput+0x2d/0x130 [ 3507.526163][T21081] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3507.532247][T21081] ? syscall_trace_enter+0x153/0x290 [ 3507.537528][T21081] ? exit_to_user_mode_prepare+0x65/0x190 [ 3507.543239][T21081] __x64_sys_clone3+0x2d/0x40 [ 3507.547915][T21081] do_syscall_64+0x4a/0x90 [ 3507.552334][T21081] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3507.558227][T21081] RIP: 0033:0x4665d9 [ 3507.562106][T21081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3507.581738][T21081] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3507.590148][T21081] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3507.598112][T21081] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 06:27:41 executing program 5: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x4d, 0x1, 0x0, 0x9, 0x1000, 0xab, 0x0, 0xfffff3ca, 0x0, 0x5}, 0x0, 0x0, r2, 0x1) perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x8, 0x7, 0x7, 0xcf, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000040), 0x1}, 0x40000, 0xfffffffffffffff8, 0x7, 0x1, 0x7f, 0x0, 0x5, 0x0, 0x8001, 0x0, 0x8000}, r2, 0x0, r3, 0x9) preadv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f0000000400)=""/71, 0x47}], 0x2, 0x90, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='freezer.state\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x2, 0x80, 0x6, 0x81, 0x0, 0xfffffffffffffbff, 0x40000, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000100), 0x3}, 0x1800, 0x1, 0x200, 0x4, 0x1f, 0x2, 0x1, 0x0, 0x7ff, 0x0, 0x3}, 0x0, 0x7, r1, 0xa) write$cgroup_type(r4, &(0x7f0000000000), 0x248800) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0), 0xd4ba0ff) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)={'#! ', './file0', [{0x20, '&#]\'\\'}], 0xa, "50b5077a12d9804f6e783efa8c166737329a58304d06210aa942314b18c96d8292585ba6bf5c55516b2d93aed7e3985dcc1a53f8dedaeec77e2437677d4456765dad200e4bbd22c71e1328def8c601db31f6a755eddff09378ee0571c3fdb106a92e169546b3eb78f39e6a9595948aef7457f916a09e6cc404c4355b1bbaacef864230d51695b137525929fd1997a77703a0a833ae040417a60eb344dfdd47d5a7d6"}, 0xb3) 06:27:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900004c6400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001360034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39004c002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:41 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3507.606073][T21081] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3507.614038][T21081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3507.622001][T21081] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:41 executing program 2 (fault-call:3 fault-nth:26): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001368034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:41 executing program 5: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) r1 = add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x1, 0x2}, &(0x7f0000000200)="1d59ba98141afa33aa98f7bf4051201b9370529bf037f4a0bcb1aa83e348d9ba15af4a4f32e2688e0afa03df926d103ed13429d28aba283e5458a6fe1618", 0x9c, 0xffffffffffffffff) keyctl$unlink(0xb, r1, 0xfffffffffffffffd) request_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000180)='keyring\x00', r1) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r2) 06:27:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000606400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:41 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f0000000300)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r1, 0x0) 06:27:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000136c034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3507.742877][T21116] FAULT_INJECTION: forcing a failure. [ 3507.742877][T21116] name failslab, interval 1, probability 0, space 0, times 0 [ 3507.755678][T21116] CPU: 1 PID: 21116 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3507.765875][T21116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3507.775940][T21116] Call Trace: [ 3507.779224][T21116] dump_stack+0x137/0x19d [ 3507.783566][T21116] should_fail+0x23c/0x250 [ 3507.788046][T21116] ? dup_mmap+0x38e/0x9c0 06:27:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390060002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000686400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3507.792375][T21116] __should_failslab+0x81/0x90 [ 3507.797140][T21116] should_failslab+0x5/0x20 [ 3507.801700][T21116] kmem_cache_alloc+0x46/0x2f0 [ 3507.806474][T21116] dup_mmap+0x38e/0x9c0 [ 3507.810648][T21116] ? alloc_pages+0x21d/0x310 [ 3507.815320][T21116] ? __list_add_valid+0x28/0x90 [ 3507.820251][T21116] ? pgd_alloc+0x120/0x140 [ 3507.824661][T21116] ? __init_rwsem+0x59/0x70 [ 3507.829158][T21116] dup_mm+0x7c/0x210 [ 3507.833055][T21116] copy_process+0x1203/0x2e00 [ 3507.837738][T21116] kernel_clone+0x14b/0x680 06:27:42 executing program 5: set_mempolicy(0x1, 0x0, 0x0) set_mempolicy(0x0, &(0x7f0000000040)=0x8, 0x37b180a3) execve(&(0x7f0000001540)='./file0/file0\x00', 0x0, 0x0) [ 3507.842234][T21116] __se_sys_clone3+0x194/0x1d0 [ 3507.847082][T21116] ? __cond_resched+0x11/0x40 [ 3507.851756][T21116] ? perf_trace_sys_exit+0x4d/0x160 [ 3507.856970][T21116] ? fput+0x2d/0x130 [ 3507.860874][T21116] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3507.866985][T21116] ? syscall_trace_enter+0x153/0x290 [ 3507.872275][T21116] ? exit_to_user_mode_prepare+0x65/0x190 [ 3507.877992][T21116] __x64_sys_clone3+0x2d/0x40 [ 3507.882679][T21116] do_syscall_64+0x4a/0x90 [ 3507.887118][T21116] entry_SYSCALL_64_after_hwframe+0x44/0xae 06:27:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900006c6400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3507.893017][T21116] RIP: 0033:0x4665d9 [ 3507.896898][T21116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3507.916504][T21116] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3507.924948][T21116] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3507.932946][T21116] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 06:27:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000746400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x20}) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) writev(r0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000001340)="a076fdc90b6cf61c3b77f19733527e26753d221fc84af8ff9d04434cb1c46a86cc11996f53299a1d9b95", 0x2a}], 0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0x1, 0x6, 0x3f, 0x9, 0xd1, 0x1ff}) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) [ 3507.940915][T21116] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3507.948945][T21116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3507.956907][T21116] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:42 executing program 2 (fault-call:3 fault-nth:27): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001374034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:42 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f0000000300)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r1, 0x0) 06:27:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390068002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3508.073152][T21160] FAULT_INJECTION: forcing a failure. [ 3508.073152][T21160] name failslab, interval 1, probability 0, space 0, times 0 [ 3508.085806][T21160] CPU: 0 PID: 21160 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3508.096044][T21160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3508.106131][T21160] Call Trace: [ 3508.109409][T21160] dump_stack+0x137/0x19d [ 3508.113737][T21160] should_fail+0x23c/0x250 [ 3508.118151][T21160] ? anon_vma_clone+0x8d/0x380 [ 3508.122926][T21160] __should_failslab+0x81/0x90 [ 3508.127702][T21160] should_failslab+0x5/0x20 [ 3508.132210][T21160] kmem_cache_alloc+0x46/0x2f0 [ 3508.137010][T21160] ? copy_page_range+0x81b/0x8e0 [ 3508.141945][T21160] anon_vma_clone+0x8d/0x380 [ 3508.146567][T21160] anon_vma_fork+0x54/0x2b0 [ 3508.151155][T21160] dup_mmap+0x49c/0x9c0 [ 3508.155319][T21160] dup_mm+0x7c/0x210 [ 3508.159211][T21160] copy_process+0x1203/0x2e00 [ 3508.163924][T21160] kernel_clone+0x14b/0x680 [ 3508.168428][T21160] __se_sys_clone3+0x194/0x1d0 [ 3508.173215][T21160] ? __cond_resched+0x11/0x40 [ 3508.177932][T21160] ? perf_trace_sys_exit+0x4d/0x160 [ 3508.183124][T21160] ? fput+0x2d/0x130 [ 3508.187028][T21160] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3508.193219][T21160] ? syscall_trace_enter+0x153/0x290 [ 3508.198503][T21160] ? exit_to_user_mode_prepare+0x65/0x190 [ 3508.204253][T21160] __x64_sys_clone3+0x2d/0x40 [ 3508.208974][T21160] do_syscall_64+0x4a/0x90 [ 3508.213431][T21160] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3508.219358][T21160] RIP: 0033:0x4665d9 [ 3508.223248][T21160] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3508.227188][T21172] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 3508.242966][T21160] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3508.242988][T21160] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 06:27:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900007a6400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000137a034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39006c002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390034a86400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:42 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f0000000300)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r1, 0x0) [ 3508.243001][T21160] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3508.243014][T21160] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3508.288222][T21160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3508.296217][T21160] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3508.308931][T21174] selinux_netlink_send: 65 callbacks suppressed 06:27:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001100034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390074002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3508.308944][T21174] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31251 sclass=netlink_route_socket pid=21174 comm=syz-executor.4 [ 3508.329111][T21178] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31251 sclass=netlink_route_socket pid=21178 comm=syz-executor.4 06:27:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001200034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001390034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:42 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') ftruncate(0xffffffffffffffff, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r1, 0x0) 06:27:42 executing program 2 (fault-call:3 fault-nth:28): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4502, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x208721) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@empty}}, &(0x7f00000003c0)=0xe8) chown(&(0x7f0000000180)='./file0/file1\x00', r2, 0xee00) open(&(0x7f0000000140)='./file0\x00', 0x100, 0xae) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0xab) r4 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r4, &(0x7f00000009c0), 0xd4ba0ff) signalfd(r4, &(0x7f00000000c0)={[0x100]}, 0x8) sendfile(r1, r0, 0x0, 0xa198) 06:27:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39007a002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000032c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:42 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') ftruncate(0xffffffffffffffff, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r1, 0x0) [ 3508.481467][T21205] FAULT_INJECTION: forcing a failure. [ 3508.481467][T21205] name failslab, interval 1, probability 0, space 0, times 0 [ 3508.494184][T21205] CPU: 1 PID: 21205 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3508.504327][T21205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3508.507359][T21208] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=36883 sclass=netlink_route_socket pid=21208 comm=syz-executor.4 [ 3508.514377][T21205] Call Trace: [ 3508.514386][T21205] dump_stack+0x137/0x19d [ 3508.535044][T21205] should_fail+0x23c/0x250 [ 3508.539472][T21205] ? anon_vma_clone+0x8d/0x380 [ 3508.544235][T21205] __should_failslab+0x81/0x90 [ 3508.545749][T21209] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=36883 sclass=netlink_route_socket pid=21209 comm=syz-executor.4 [ 3508.549017][T21205] should_failslab+0x5/0x20 [ 3508.549038][T21205] kmem_cache_alloc+0x46/0x2f0 [ 3508.571443][T21205] anon_vma_clone+0x8d/0x380 [ 3508.576026][T21205] anon_vma_fork+0x54/0x2b0 06:27:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013c0034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3508.580572][T21205] dup_mmap+0x49c/0x9c0 [ 3508.584755][T21205] dup_mm+0x7c/0x210 [ 3508.588688][T21205] copy_process+0x1203/0x2e00 [ 3508.593357][T21205] kernel_clone+0x14b/0x680 [ 3508.597856][T21205] __se_sys_clone3+0x194/0x1d0 [ 3508.602641][T21205] ? __cond_resched+0x11/0x40 [ 3508.607368][T21205] ? perf_trace_sys_exit+0x4d/0x160 [ 3508.612563][T21205] ? fput+0x2d/0x130 [ 3508.616493][T21205] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3508.622554][T21205] ? syscall_trace_enter+0x153/0x290 06:27:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3508.627839][T21205] ? exit_to_user_mode_prepare+0x65/0x190 [ 3508.633572][T21205] __x64_sys_clone3+0x2d/0x40 [ 3508.638299][T21205] do_syscall_64+0x4a/0x90 [ 3508.642825][T21205] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3508.648825][T21205] RIP: 0033:0x4665d9 [ 3508.652711][T21205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3508.672600][T21205] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 06:27:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000052c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3508.681017][T21205] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3508.689047][T21205] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3508.697019][T21205] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3508.704979][T21205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3508.712933][T21205] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:42 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') ftruncate(0xffffffffffffffff, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r1, 0x0) 06:27:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000062c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013e8034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:42 executing program 2 (fault-call:3 fault-nth:29): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3508.727344][T21224] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=49171 sclass=netlink_route_socket pid=21224 comm=syz-executor.4 [ 3508.757369][T21235] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=49171 sclass=netlink_route_socket pid=21235 comm=syz-executor.4 06:27:42 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) poll(&(0x7f0000000100)=[{r0, 0x1179}, {0xffffffffffffffff, 0x2604}, {r0, 0x6274}], 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0) 06:27:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000072c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001500034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:42 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3508.826670][T21242] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59411 sclass=netlink_route_socket pid=21242 comm=syz-executor.4 06:27:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013fd034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3508.866046][T21250] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59411 sclass=netlink_route_socket pid=21250 comm=syz-executor.4 06:27:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001600034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3508.905542][T21252] FAULT_INJECTION: forcing a failure. [ 3508.905542][T21252] name failslab, interval 1, probability 0, space 0, times 0 [ 3508.918181][T21252] CPU: 1 PID: 21252 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3508.928341][T21252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3508.938533][T21252] Call Trace: [ 3508.941802][T21252] dump_stack+0x137/0x19d [ 3508.946146][T21252] should_fail+0x23c/0x250 [ 3508.950566][T21252] ? anon_vma_fork+0xb1/0x2b0 [ 3508.955350][T21252] __should_failslab+0x81/0x90 [ 3508.955819][T21259] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=64787 sclass=netlink_route_socket pid=21259 comm=syz-executor.4 [ 3508.960125][T21252] should_failslab+0x5/0x20 [ 3508.960143][T21252] kmem_cache_alloc+0x46/0x2f0 [ 3508.982213][T21262] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=64787 sclass=netlink_route_socket pid=21262 comm=syz-executor.4 [ 3508.982616][T21252] anon_vma_fork+0xb1/0x2b0 [ 3508.982638][T21252] dup_mmap+0x49c/0x9c0 06:27:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300054700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3509.004400][T21252] dup_mm+0x7c/0x210 [ 3509.008286][T21252] copy_process+0x1203/0x2e00 [ 3509.012970][T21252] kernel_clone+0x14b/0x680 [ 3509.017511][T21252] __se_sys_clone3+0x194/0x1d0 [ 3509.022264][T21252] ? __cond_resched+0x11/0x40 [ 3509.026963][T21252] ? perf_trace_sys_exit+0x4d/0x160 [ 3509.032173][T21252] ? fput+0x2d/0x130 [ 3509.036169][T21252] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3509.042237][T21252] ? syscall_trace_enter+0x153/0x290 [ 3509.047616][T21252] ? exit_to_user_mode_prepare+0x65/0x190 06:27:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000092c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3509.053341][T21252] __x64_sys_clone3+0x2d/0x40 [ 3509.058011][T21252] do_syscall_64+0x4a/0x90 [ 3509.058304][T21257] tmpfs: Unknown parameter './bus' [ 3509.062427][T21252] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3509.062454][T21252] RIP: 0033:0x4665d9 [ 3509.062468][T21252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3509.096941][T21252] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3509.105395][T21252] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3509.113372][T21252] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3509.121382][T21252] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3509.129369][T21252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3509.137404][T21252] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r5}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300064700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000a2c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:43 executing program 2 (fault-call:3 fault-nth:30): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:43 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r5}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300074700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000b2c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3509.269319][T21294] validate_nla: 53 callbacks suppressed [ 3509.269343][T21294] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 3509.290141][T21300] FAULT_INJECTION: forcing a failure. [ 3509.290141][T21300] name failslab, interval 1, probability 0, space 0, times 0 [ 3509.295511][T21302] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3509.302767][T21300] CPU: 0 PID: 21300 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3509.316578][T21302] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3509.320932][T21300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3509.320945][T21300] Call Trace: [ 3509.320952][T21300] dump_stack+0x137/0x19d [ 3509.346395][T21294] netlink: 'syz-executor.5': attribute type 17 has an invalid length. [ 3509.346719][T21300] should_fail+0x23c/0x250 [ 3509.359248][T21300] ? anon_vma_fork+0xb1/0x2b0 [ 3509.359836][T21302] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3509.363927][T21300] __should_failslab+0x81/0x90 [ 3509.363968][T21300] should_failslab+0x5/0x20 [ 3509.363984][T21300] kmem_cache_alloc+0x46/0x2f0 [ 3509.364003][T21300] anon_vma_fork+0xb1/0x2b0 [ 3509.364040][T21300] dup_mmap+0x49c/0x9c0 [ 3509.394747][T21300] dup_mm+0x7c/0x210 [ 3509.398660][T21300] copy_process+0x1203/0x2e00 [ 3509.403328][T21300] kernel_clone+0x14b/0x680 [ 3509.407854][T21300] __se_sys_clone3+0x194/0x1d0 [ 3509.412638][T21300] ? __cond_resched+0x11/0x40 06:27:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001900034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:43 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000c2c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3509.417382][T21300] ? perf_trace_sys_exit+0x4d/0x160 [ 3509.422629][T21300] ? fput+0x2d/0x130 [ 3509.426517][T21300] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3509.432582][T21300] ? syscall_trace_enter+0x153/0x290 [ 3509.437885][T21300] ? exit_to_user_mode_prepare+0x65/0x190 [ 3509.443601][T21300] __x64_sys_clone3+0x2d/0x40 [ 3509.448271][T21300] do_syscall_64+0x4a/0x90 [ 3509.452784][T21300] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3509.458706][T21300] RIP: 0033:0x4665d9 06:27:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000d2c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3509.462602][T21300] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3509.482196][T21300] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3509.490659][T21300] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3509.498634][T21300] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3509.506596][T21300] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:27:43 executing program 2 (fault-call:3 fault-nth:31): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r5}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3509.514576][T21300] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3509.522538][T21300] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3509.549794][T21305] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3509.582252][T21323] FAULT_INJECTION: forcing a failure. [ 3509.582252][T21323] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3509.595521][T21323] CPU: 0 PID: 21323 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3509.605670][T21323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3509.612583][T21322] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 3509.615728][T21323] Call Trace: [ 3509.615737][T21323] dump_stack+0x137/0x19d 06:27:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000e2c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300094700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:43 executing program 0: chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3509.615759][T21323] should_fail+0x23c/0x250 [ 3509.615774][T21323] __alloc_pages+0x102/0x320 [ 3509.615790][T21323] alloc_pages+0x21d/0x310 [ 3509.644869][T21323] get_zeroed_page+0x13/0x40 [ 3509.649501][T21323] __pud_alloc+0x44/0x190 [ 3509.653828][T21323] copy_page_range+0x73a/0x8e0 [ 3509.658585][T21323] ? vma_interval_tree_augment_rotate+0x100/0x100 [ 3509.665001][T21323] ? anon_vma_fork+0x117/0x2b0 [ 3509.669760][T21323] ? __rb_insert_augmented+0x7f/0x350 [ 3509.675113][T21323] ? up_write+0x25/0xc0 06:27:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900c1102c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3509.679286][T21323] dup_mmap+0x6ab/0x9c0 [ 3509.683441][T21323] dup_mm+0x7c/0x210 [ 3509.687325][T21323] copy_process+0x1203/0x2e00 [ 3509.691999][T21323] kernel_clone+0x14b/0x680 [ 3509.696596][T21323] __se_sys_clone3+0x194/0x1d0 [ 3509.701354][T21323] ? __cond_resched+0x11/0x40 [ 3509.706037][T21323] ? perf_trace_sys_exit+0x4d/0x160 [ 3509.711233][T21323] ? fput+0x2d/0x130 [ 3509.715123][T21323] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3509.721204][T21323] ? syscall_trace_enter+0x153/0x290 [ 3509.726476][T21323] ? exit_to_user_mode_prepare+0x65/0x190 06:27:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000112c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3509.732190][T21323] __x64_sys_clone3+0x2d/0x40 [ 3509.736937][T21323] do_syscall_64+0x4a/0x90 [ 3509.741346][T21323] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3509.747243][T21323] RIP: 0033:0x4665d9 [ 3509.751123][T21323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3509.770722][T21323] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3509.779127][T21323] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3509.787095][T21323] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3509.795059][T21323] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3509.803022][T21323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3509.810979][T21323] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000122c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:44 executing program 2 (fault-call:3 fault-nth:32): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001d00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r5}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3509.824625][T21335] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3509.834336][T21337] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3509.849442][T21322] netlink: 'syz-executor.5': attribute type 17 has an invalid length. [ 3509.864774][T21337] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000202c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013000a4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3509.922994][T21346] FAULT_INJECTION: forcing a failure. [ 3509.922994][T21346] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3509.936246][T21346] CPU: 0 PID: 21346 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3509.946389][T21346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3509.956436][T21346] Call Trace: [ 3509.959711][T21346] dump_stack+0x137/0x19d [ 3509.964062][T21346] should_fail+0x23c/0x250 [ 3509.968519][T21346] __alloc_pages+0x102/0x320 06:27:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000252c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:44 executing program 0: chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3509.973123][T21346] alloc_pages+0x21d/0x310 [ 3509.977558][T21346] pte_alloc_one+0x29/0xb0 [ 3509.981992][T21346] __pte_alloc+0x2f/0x210 [ 3509.986380][T21346] copy_pte_range+0x128e/0x1460 [ 3509.991228][T21346] ? __alloc_pages+0x194/0x320 [ 3509.996021][T21346] copy_page_range+0x5da/0x8e0 [ 3510.000796][T21346] ? up_write+0x25/0xc0 [ 3510.004944][T21346] dup_mmap+0x6ab/0x9c0 [ 3510.009093][T21346] dup_mm+0x7c/0x210 [ 3510.012980][T21346] copy_process+0x1203/0x2e00 [ 3510.017658][T21346] kernel_clone+0x14b/0x680 [ 3510.022156][T21346] __se_sys_clone3+0x194/0x1d0 [ 3510.026935][T21346] ? __cond_resched+0x11/0x40 [ 3510.031609][T21346] ? perf_trace_sys_exit+0x4d/0x160 [ 3510.036810][T21346] ? fput+0x2d/0x130 [ 3510.040705][T21346] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3510.046775][T21346] ? syscall_trace_enter+0x153/0x290 [ 3510.052056][T21346] ? exit_to_user_mode_prepare+0x65/0x190 [ 3510.057772][T21346] __x64_sys_clone3+0x2d/0x40 [ 3510.062446][T21346] do_syscall_64+0x4a/0x90 [ 3510.066857][T21346] entry_SYSCALL_64_after_hwframe+0x44/0xae 06:27:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000482c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3510.072746][T21346] RIP: 0033:0x4665d9 [ 3510.076628][T21346] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3510.096220][T21346] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3510.104637][T21346] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3510.112601][T21346] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 06:27:44 executing program 2 (fault-call:3 fault-nth:33): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3510.120560][T21346] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3510.128522][T21346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3510.136512][T21346] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0), 0xd4ba0ff) r2 = openat(r1, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r3, &(0x7f0000000240), &(0x7f0000000040)=0x14) socket$inet6_tcp(0xa, 0x1, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001e00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3510.201540][T21366] FAULT_INJECTION: forcing a failure. [ 3510.201540][T21366] name failslab, interval 1, probability 0, space 0, times 0 [ 3510.214174][T21366] CPU: 1 PID: 21366 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3510.222507][T21373] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3510.224323][T21366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3510.224337][T21366] Call Trace: [ 3510.224343][T21366] dump_stack+0x137/0x19d [ 3510.251221][T21366] should_fail+0x23c/0x250 [ 3510.255632][T21366] ? anon_vma_clone+0x8d/0x380 [ 3510.260424][T21366] __should_failslab+0x81/0x90 [ 3510.265214][T21366] should_failslab+0x5/0x20 [ 3510.269724][T21366] kmem_cache_alloc+0x46/0x2f0 [ 3510.274485][T21366] ? avc_has_perm_noaudit+0x19a/0x240 [ 3510.279998][T21366] anon_vma_clone+0x8d/0x380 [ 3510.284584][T21366] anon_vma_fork+0x54/0x2b0 [ 3510.289079][T21366] dup_mmap+0x49c/0x9c0 [ 3510.293260][T21366] dup_mm+0x7c/0x210 [ 3510.297156][T21366] copy_process+0x1203/0x2e00 06:27:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900004c2c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013000b4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002000034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:44 executing program 0: chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3510.301822][T21366] kernel_clone+0x14b/0x680 [ 3510.306312][T21366] __se_sys_clone3+0x194/0x1d0 [ 3510.311076][T21366] ? __cond_resched+0x11/0x40 [ 3510.315743][T21366] ? perf_trace_sys_exit+0x4d/0x160 [ 3510.320981][T21366] ? fput+0x2d/0x130 [ 3510.324870][T21366] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3510.330996][T21366] ? syscall_trace_enter+0x153/0x290 [ 3510.336279][T21366] ? exit_to_user_mode_prepare+0x65/0x190 [ 3510.341997][T21366] __x64_sys_clone3+0x2d/0x40 [ 3510.346719][T21366] do_syscall_64+0x4a/0x90 [ 3510.351129][T21366] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3510.357118][T21366] RIP: 0033:0x4665d9 [ 3510.361034][T21366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3510.380701][T21366] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3510.389106][T21366] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 06:27:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000602c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000682c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0), 0xd4ba0ff) r2 = openat(r1, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r3, &(0x7f0000000240), &(0x7f0000000040)=0x14) socket$inet6_tcp(0xa, 0x1, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002100034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3510.397071][T21366] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3510.405028][T21366] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3510.413062][T21366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3510.421022][T21366] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:44 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:44 executing program 2 (fault-call:3 fault-nth:34): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013000c4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013000d4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0), 0xd4ba0ff) r2 = openat(r1, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r3, &(0x7f0000000240), &(0x7f0000000040)=0x14) socket$inet6_tcp(0xa, 0x1, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3510.532311][T21403] FAULT_INJECTION: forcing a failure. [ 3510.532311][T21403] name failslab, interval 1, probability 0, space 0, times 0 [ 3510.545037][T21403] CPU: 1 PID: 21403 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3510.555173][T21403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3510.565238][T21403] Call Trace: [ 3510.568509][T21403] dump_stack+0x137/0x19d [ 3510.572851][T21403] should_fail+0x23c/0x250 [ 3510.577297][T21403] ? dup_mmap+0x38e/0x9c0 06:27:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900006c2c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002200034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3510.581724][T21403] __should_failslab+0x81/0x90 [ 3510.586627][T21403] should_failslab+0x5/0x20 [ 3510.591212][T21403] kmem_cache_alloc+0x46/0x2f0 [ 3510.596136][T21403] ? up_write+0x25/0xc0 [ 3510.600282][T21403] dup_mmap+0x38e/0x9c0 [ 3510.604447][T21403] dup_mm+0x7c/0x210 [ 3510.608339][T21403] copy_process+0x1203/0x2e00 [ 3510.613080][T21403] kernel_clone+0x14b/0x680 [ 3510.617649][T21403] __se_sys_clone3+0x194/0x1d0 [ 3510.622493][T21403] ? __cond_resched+0x11/0x40 [ 3510.627170][T21403] ? perf_trace_sys_exit+0x4d/0x160 [ 3510.632386][T21403] ? fput+0x2d/0x130 [ 3510.636293][T21403] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3510.642340][T21403] ? syscall_trace_enter+0x153/0x290 [ 3510.647602][T21403] ? exit_to_user_mode_prepare+0x65/0x190 [ 3510.653299][T21403] __x64_sys_clone3+0x2d/0x40 [ 3510.657951][T21403] do_syscall_64+0x4a/0x90 [ 3510.662343][T21403] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3510.668251][T21403] RIP: 0033:0x4665d9 [ 3510.672119][T21403] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3510.691776][T21403] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3510.700182][T21403] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3510.708216][T21403] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3510.716191][T21403] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3510.724167][T21403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 06:27:44 executing program 2 (fault-call:3 fault-nth:35): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000742c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3510.732176][T21403] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:44 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r5}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900007a2c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3510.838839][T21426] FAULT_INJECTION: forcing a failure. [ 3510.838839][T21426] name failslab, interval 1, probability 0, space 0, times 0 [ 3510.851540][T21426] CPU: 0 PID: 21426 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3510.861762][T21426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3510.871854][T21426] Call Trace: [ 3510.875151][T21426] dump_stack+0x137/0x19d [ 3510.879677][T21426] should_fail+0x23c/0x250 [ 3510.884093][T21426] ? anon_vma_clone+0x8d/0x380 06:27:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:45 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013000e4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390010c12c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3510.888925][T21426] __should_failslab+0x81/0x90 [ 3510.893703][T21426] should_failslab+0x5/0x20 [ 3510.898310][T21426] kmem_cache_alloc+0x46/0x2f0 [ 3510.903067][T21426] ? copy_page_range+0x81b/0x8e0 [ 3510.908094][T21426] anon_vma_clone+0x8d/0x380 [ 3510.912766][T21426] anon_vma_fork+0x54/0x2b0 [ 3510.917272][T21426] dup_mmap+0x49c/0x9c0 [ 3510.921507][T21426] dup_mm+0x7c/0x210 [ 3510.925401][T21426] copy_process+0x1203/0x2e00 [ 3510.930093][T21426] kernel_clone+0x14b/0x680 [ 3510.934608][T21426] __se_sys_clone3+0x194/0x1d0 [ 3510.939364][T21426] ? __cond_resched+0x11/0x40 [ 3510.944043][T21426] ? perf_trace_sys_exit+0x4d/0x160 [ 3510.949327][T21426] ? fput+0x2d/0x130 [ 3510.953236][T21426] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3510.959310][T21426] ? syscall_trace_enter+0x153/0x290 [ 3510.964675][T21426] ? exit_to_user_mode_prepare+0x65/0x190 [ 3510.970410][T21426] __x64_sys_clone3+0x2d/0x40 [ 3510.975131][T21426] do_syscall_64+0x4a/0x90 [ 3510.979592][T21426] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3510.985489][T21426] RIP: 0033:0x4665d9 06:27:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001100034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3510.989402][T21426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3511.009010][T21426] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3511.017484][T21426] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3511.025552][T21426] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 06:27:45 executing program 2 (fault-call:3 fault-nth:36): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001200034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3511.033594][T21426] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3511.041643][T21426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3511.049671][T21426] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3511.058604][T21440] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 06:27:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300114700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r5}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:45 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002500034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3511.139966][T21459] FAULT_INJECTION: forcing a failure. [ 3511.139966][T21459] name failslab, interval 1, probability 0, space 0, times 0 [ 3511.152784][T21459] CPU: 0 PID: 21459 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3511.162937][T21459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3511.172987][T21459] Call Trace: [ 3511.176262][T21459] dump_stack+0x137/0x19d [ 3511.180599][T21459] should_fail+0x23c/0x250 [ 3511.185021][T21459] ? anon_vma_fork+0xb1/0x2b0 [ 3511.189744][T21459] __should_failslab+0x81/0x90 [ 3511.194553][T21459] should_failslab+0x5/0x20 [ 3511.199145][T21459] kmem_cache_alloc+0x46/0x2f0 [ 3511.203929][T21459] anon_vma_fork+0xb1/0x2b0 [ 3511.208419][T21459] dup_mmap+0x49c/0x9c0 [ 3511.212620][T21459] dup_mm+0x7c/0x210 [ 3511.216499][T21459] copy_process+0x1203/0x2e00 [ 3511.221170][T21459] kernel_clone+0x14b/0x680 [ 3511.225716][T21459] __se_sys_clone3+0x194/0x1d0 [ 3511.230505][T21459] ? __cond_resched+0x11/0x40 [ 3511.235300][T21459] ? perf_trace_sys_exit+0x4d/0x160 [ 3511.240507][T21459] ? fput+0x2d/0x130 [ 3511.244398][T21459] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3511.250477][T21459] ? syscall_trace_enter+0x153/0x290 [ 3511.255776][T21459] ? exit_to_user_mode_prepare+0x65/0x190 [ 3511.261499][T21459] __x64_sys_clone3+0x2d/0x40 [ 3511.266178][T21459] do_syscall_64+0x4a/0x90 [ 3511.270599][T21459] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3511.276517][T21459] RIP: 0033:0x4665d9 [ 3511.280409][T21459] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3511.300218][T21459] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3511.308631][T21459] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3511.316596][T21459] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3511.324572][T21459] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3511.332535][T21459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 06:27:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3511.340534][T21459] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3511.353373][T21469] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 06:27:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300124700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:45 executing program 2 (fault-call:3 fault-nth:37): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:45 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001500034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002600034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3511.459281][T21500] FAULT_INJECTION: forcing a failure. [ 3511.459281][T21500] name failslab, interval 1, probability 0, space 0, times 0 [ 3511.472108][T21500] CPU: 1 PID: 21500 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3511.482313][T21500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3511.492365][T21500] Call Trace: [ 3511.495646][T21500] dump_stack+0x137/0x19d [ 3511.499977][T21500] should_fail+0x23c/0x250 [ 3511.504415][T21500] ? anon_vma_fork+0xb1/0x2b0 [ 3511.509181][T21500] __should_failslab+0x81/0x90 [ 3511.513948][T21500] should_failslab+0x5/0x20 [ 3511.518508][T21500] kmem_cache_alloc+0x46/0x2f0 [ 3511.523349][T21500] anon_vma_fork+0xb1/0x2b0 [ 3511.527854][T21500] dup_mmap+0x49c/0x9c0 [ 3511.532005][T21500] dup_mm+0x7c/0x210 [ 3511.532918][T21504] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3511.535892][T21500] copy_process+0x1203/0x2e00 [ 3511.535928][T21500] kernel_clone+0x14b/0x680 [ 3511.554419][T21500] __se_sys_clone3+0x194/0x1d0 06:27:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001600034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300024700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3511.559238][T21500] ? __cond_resched+0x11/0x40 [ 3511.563953][T21500] ? perf_trace_sys_exit+0x4d/0x160 [ 3511.569148][T21500] ? fput+0x2d/0x130 [ 3511.573030][T21500] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3511.579092][T21500] ? syscall_trace_enter+0x153/0x290 [ 3511.584471][T21500] ? exit_to_user_mode_prepare+0x65/0x190 [ 3511.590183][T21500] __x64_sys_clone3+0x2d/0x40 [ 3511.594882][T21500] do_syscall_64+0x4a/0x90 [ 3511.599352][T21500] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3511.605270][T21500] RIP: 0033:0x4665d9 [ 3511.609183][T21500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3511.628977][T21500] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3511.637378][T21500] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3511.640429][T21516] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 06:27:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002900034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3511.645399][T21500] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3511.645414][T21500] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3511.645426][T21500] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3511.678577][T21500] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300044700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:45 executing program 2 (fault-call:3 fault-nth:38): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:45 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001900034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r5}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3511.757798][T21527] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3511.816234][T21536] FAULT_INJECTION: forcing a failure. [ 3511.816234][T21536] name failslab, interval 1, probability 0, space 0, times 0 [ 3511.828867][T21536] CPU: 0 PID: 21536 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3511.839155][T21536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3511.849244][T21536] Call Trace: [ 3511.852548][T21536] dump_stack+0x137/0x19d [ 3511.856995][T21536] should_fail+0x23c/0x250 [ 3511.861412][T21536] ? dup_mmap+0x38e/0x9c0 [ 3511.865735][T21536] __should_failslab+0x81/0x90 [ 3511.870601][T21536] should_failslab+0x5/0x20 [ 3511.875126][T21536] kmem_cache_alloc+0x46/0x2f0 [ 3511.879904][T21536] dup_mmap+0x38e/0x9c0 [ 3511.884061][T21536] dup_mm+0x7c/0x210 [ 3511.887952][T21536] copy_process+0x1203/0x2e00 [ 3511.892628][T21536] kernel_clone+0x14b/0x680 [ 3511.897125][T21536] __se_sys_clone3+0x194/0x1d0 [ 3511.901915][T21536] ? __cond_resched+0x11/0x40 [ 3511.906670][T21536] ? perf_trace_sys_exit+0x4d/0x160 [ 3511.911892][T21536] ? fput+0x2d/0x130 [ 3511.915956][T21536] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3511.922037][T21536] ? syscall_trace_enter+0x153/0x290 [ 3511.927323][T21536] ? exit_to_user_mode_prepare+0x65/0x190 [ 3511.933088][T21536] __x64_sys_clone3+0x2d/0x40 [ 3511.937760][T21536] do_syscall_64+0x4a/0x90 [ 3511.942194][T21536] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3511.948094][T21536] RIP: 0033:0x4665d9 06:27:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:46 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300054700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3511.951997][T21536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3511.971605][T21536] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3511.979801][T21555] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3511.980050][T21536] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3511.980065][T21536] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3511.980078][T21536] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:27:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r5}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3512.013196][T21536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3512.021188][T21536] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001d00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002b00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:46 executing program 2 (fault-call:3 fault-nth:39): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:46 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300064700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r5}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001e00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3512.155491][T21575] FAULT_INJECTION: forcing a failure. [ 3512.155491][T21575] name failslab, interval 1, probability 0, space 0, times 0 [ 3512.161292][T21586] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3512.168120][T21575] CPU: 1 PID: 21575 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3512.187503][T21575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3512.197549][T21575] Call Trace: [ 3512.200821][T21575] dump_stack+0x137/0x19d 06:27:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002d00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3512.205157][T21575] should_fail+0x23c/0x250 [ 3512.209571][T21575] ? dup_mmap+0x38e/0x9c0 [ 3512.213894][T21575] __should_failslab+0x81/0x90 [ 3512.218655][T21575] should_failslab+0x5/0x20 [ 3512.221810][T21589] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3512.223242][T21575] kmem_cache_alloc+0x46/0x2f0 [ 3512.237389][T21575] ? up_write+0x25/0xc0 [ 3512.241536][T21575] dup_mmap+0x38e/0x9c0 [ 3512.245687][T21575] dup_mm+0x7c/0x210 [ 3512.249573][T21575] copy_process+0x1203/0x2e00 06:27:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002e00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3512.254242][T21575] kernel_clone+0x14b/0x680 [ 3512.258776][T21575] __se_sys_clone3+0x194/0x1d0 [ 3512.263570][T21575] ? __cond_resched+0x11/0x40 [ 3512.268380][T21575] ? perf_trace_sys_exit+0x4d/0x160 [ 3512.273572][T21575] ? fput+0x2d/0x130 [ 3512.277474][T21575] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3512.283541][T21575] ? syscall_trace_enter+0x153/0x290 [ 3512.288824][T21575] ? exit_to_user_mode_prepare+0x65/0x190 [ 3512.294581][T21575] __x64_sys_clone3+0x2d/0x40 [ 3512.299268][T21575] do_syscall_64+0x4a/0x90 [ 3512.303709][T21575] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3512.309600][T21575] RIP: 0033:0x4665d9 [ 3512.313520][T21575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3512.333231][T21575] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3512.341634][T21575] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 06:27:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002000034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3512.349685][T21575] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3512.357696][T21575] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3512.365651][T21575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3512.373620][T21575] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300074700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000003000034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:46 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002100034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:46 executing program 2 (fault-call:3 fault-nth:40): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r4}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300084700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3512.515719][T21623] FAULT_INJECTION: forcing a failure. [ 3512.515719][T21623] name failslab, interval 1, probability 0, space 0, times 0 [ 3512.528430][T21623] CPU: 0 PID: 21623 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3512.538590][T21623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3512.548649][T21623] Call Trace: [ 3512.551952][T21623] dump_stack+0x137/0x19d [ 3512.556282][T21623] should_fail+0x23c/0x250 [ 3512.560702][T21623] ? anon_vma_clone+0x8d/0x380 06:27:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000003100034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002200034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r4}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3512.565448][T21623] __should_failslab+0x81/0x90 [ 3512.570215][T21623] should_failslab+0x5/0x20 [ 3512.574713][T21623] kmem_cache_alloc+0x46/0x2f0 [ 3512.579473][T21623] anon_vma_clone+0x8d/0x380 [ 3512.584060][T21623] anon_vma_fork+0x54/0x2b0 [ 3512.588603][T21623] dup_mmap+0x49c/0x9c0 [ 3512.592740][T21623] dup_mm+0x7c/0x210 [ 3512.596631][T21623] copy_process+0x1203/0x2e00 [ 3512.601316][T21623] kernel_clone+0x14b/0x680 [ 3512.605817][T21623] __se_sys_clone3+0x194/0x1d0 [ 3512.610601][T21623] ? __cond_resched+0x11/0x40 [ 3512.615287][T21623] ? perf_trace_sys_exit+0x4d/0x160 [ 3512.620490][T21623] ? fput+0x2d/0x130 [ 3512.624379][T21623] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3512.630466][T21623] ? syscall_trace_enter+0x153/0x290 [ 3512.635750][T21623] ? exit_to_user_mode_prepare+0x65/0x190 [ 3512.641473][T21623] __x64_sys_clone3+0x2d/0x40 [ 3512.646138][T21623] do_syscall_64+0x4a/0x90 [ 3512.650595][T21623] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3512.656506][T21623] RIP: 0033:0x4665d9 06:27:46 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(0x0) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3512.660414][T21623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3512.680048][T21623] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3512.688509][T21623] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3512.696484][T21623] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3512.704547][T21623] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:27:46 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(0x0) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3512.712510][T21623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3512.720603][T21623] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000003200034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300094700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:46 executing program 2 (fault-call:3 fault-nth:41): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r4}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:46 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(0x0) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3512.808594][T21657] tc_dump_action: action bad kind [ 3512.836041][T21660] FAULT_INJECTION: forcing a failure. [ 3512.836041][T21660] name failslab, interval 1, probability 0, space 0, times 0 [ 3512.848677][T21660] CPU: 1 PID: 21660 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3512.858899][T21660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3512.868947][T21660] Call Trace: [ 3512.872214][T21660] dump_stack+0x137/0x19d [ 3512.876625][T21660] should_fail+0x23c/0x250 [ 3512.881035][T21660] ? anon_vma_clone+0x8d/0x380 [ 3512.885797][T21660] __should_failslab+0x81/0x90 [ 3512.890608][T21660] should_failslab+0x5/0x20 [ 3512.895092][T21660] kmem_cache_alloc+0x46/0x2f0 [ 3512.899898][T21660] ? avc_has_perm_noaudit+0x19a/0x240 [ 3512.905368][T21660] anon_vma_clone+0x8d/0x380 [ 3512.909947][T21660] anon_vma_fork+0x54/0x2b0 [ 3512.914475][T21660] dup_mmap+0x49c/0x9c0 [ 3512.918618][T21660] dup_mm+0x7c/0x210 [ 3512.922488][T21660] copy_process+0x1203/0x2e00 [ 3512.927148][T21660] kernel_clone+0x14b/0x680 [ 3512.931673][T21660] __se_sys_clone3+0x194/0x1d0 [ 3512.936453][T21660] ? __cond_resched+0x11/0x40 [ 3512.941120][T21660] ? perf_trace_sys_exit+0x4d/0x160 [ 3512.946316][T21660] ? fput+0x2d/0x130 [ 3512.950221][T21660] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3512.956281][T21660] ? syscall_trace_enter+0x153/0x290 [ 3512.961597][T21660] ? exit_to_user_mode_prepare+0x65/0x190 [ 3512.967311][T21660] __x64_sys_clone3+0x2d/0x40 [ 3512.972040][T21660] do_syscall_64+0x4a/0x90 [ 3512.976452][T21660] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3512.982403][T21660] RIP: 0033:0x4665d9 [ 3512.986278][T21660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3513.005890][T21660] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3513.014404][T21660] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3513.022372][T21660] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 06:27:47 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(0x0, 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000003400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002500034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013000a4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r5}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3513.030338][T21660] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3513.038309][T21660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3513.046384][T21660] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013000b4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002600034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000003a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:47 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(0x0, 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:47 executing program 2 (fault-call:3 fault-nth:42): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r4}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013000c4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:47 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(0x0, 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000003e00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3513.251306][T21722] FAULT_INJECTION: forcing a failure. [ 3513.251306][T21722] name failslab, interval 1, probability 0, space 0, times 0 [ 3513.263944][T21722] CPU: 1 PID: 21722 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3513.274089][T21722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3513.284139][T21722] Call Trace: [ 3513.287417][T21722] dump_stack+0x137/0x19d [ 3513.291751][T21722] should_fail+0x23c/0x250 [ 3513.296156][T21722] ? anon_vma_fork+0xb1/0x2b0 06:27:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013000d4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002900034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r4}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000004200034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:47 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r1, 0x0) [ 3513.300819][T21722] __should_failslab+0x81/0x90 [ 3513.305587][T21722] should_failslab+0x5/0x20 [ 3513.310106][T21722] kmem_cache_alloc+0x46/0x2f0 [ 3513.314871][T21722] anon_vma_fork+0xb1/0x2b0 [ 3513.319368][T21722] dup_mmap+0x49c/0x9c0 [ 3513.323532][T21722] dup_mm+0x7c/0x210 [ 3513.327430][T21722] copy_process+0x1203/0x2e00 [ 3513.332124][T21722] kernel_clone+0x14b/0x680 [ 3513.336698][T21722] __se_sys_clone3+0x194/0x1d0 [ 3513.341453][T21722] ? __cond_resched+0x11/0x40 [ 3513.346137][T21722] ? perf_trace_sys_exit+0x4d/0x160 [ 3513.351389][T21722] ? fput+0x2d/0x130 [ 3513.355283][T21722] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3513.361357][T21722] ? syscall_trace_enter+0x153/0x290 [ 3513.366656][T21722] ? exit_to_user_mode_prepare+0x65/0x190 [ 3513.372376][T21722] __x64_sys_clone3+0x2d/0x40 [ 3513.377044][T21722] do_syscall_64+0x4a/0x90 [ 3513.381518][T21722] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3513.387393][T21722] RIP: 0033:0x4665d9 [ 3513.391276][T21722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3513.410876][T21722] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3513.419300][T21722] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3513.427255][T21722] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3513.435309][T21722] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3513.443302][T21722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 06:27:47 executing program 2 (fault-call:3 fault-nth:43): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3513.451263][T21722] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000004300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013000e4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3513.497304][T21743] FAULT_INJECTION: forcing a failure. [ 3513.497304][T21743] name failslab, interval 1, probability 0, space 0, times 0 [ 3513.509986][T21743] CPU: 0 PID: 21743 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3513.520136][T21743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3513.530181][T21743] Call Trace: [ 3513.533560][T21743] dump_stack+0x137/0x19d [ 3513.537952][T21743] should_fail+0x23c/0x250 [ 3513.542369][T21743] ? anon_vma_fork+0x117/0x2b0 06:27:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000022c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3513.547181][T21743] __should_failslab+0x81/0x90 [ 3513.552032][T21743] should_failslab+0x5/0x20 [ 3513.556532][T21743] kmem_cache_alloc+0x46/0x2f0 [ 3513.561354][T21743] ? anon_vma_fork+0xb1/0x2b0 [ 3513.566065][T21743] anon_vma_fork+0x117/0x2b0 [ 3513.570672][T21743] dup_mmap+0x49c/0x9c0 [ 3513.574836][T21743] dup_mm+0x7c/0x210 [ 3513.578739][T21743] copy_process+0x1203/0x2e00 [ 3513.583462][T21743] kernel_clone+0x14b/0x680 [ 3513.587986][T21743] __se_sys_clone3+0x194/0x1d0 [ 3513.592805][T21743] ? __cond_resched+0x11/0x40 [ 3513.597500][T21743] ? perf_trace_sys_exit+0x4d/0x160 [ 3513.602700][T21743] ? fput+0x2d/0x130 [ 3513.606588][T21743] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3513.612691][T21743] ? syscall_trace_enter+0x153/0x290 [ 3513.618022][T21743] ? exit_to_user_mode_prepare+0x65/0x190 [ 3513.623846][T21743] __x64_sys_clone3+0x2d/0x40 [ 3513.628519][T21743] do_syscall_64+0x4a/0x90 [ 3513.632956][T21743] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3513.638947][T21743] RIP: 0033:0x4665d9 06:27:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000032c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3513.642902][T21743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3513.662610][T21743] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3513.671070][T21743] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3513.679107][T21743] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3513.687105][T21743] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:27:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000004800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:47 executing program 2 (fault-call:3 fault-nth:44): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r4}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3513.695095][T21743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3513.703059][T21743] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300104700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000042c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:47 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r1, 0x0) [ 3513.783391][T21769] FAULT_INJECTION: forcing a failure. [ 3513.783391][T21769] name failslab, interval 1, probability 0, space 0, times 0 [ 3513.796227][T21769] CPU: 0 PID: 21769 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3513.806373][T21769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3513.816479][T21769] Call Trace: [ 3513.819752][T21769] dump_stack+0x137/0x19d [ 3513.824113][T21769] should_fail+0x23c/0x250 [ 3513.828617][T21769] ? anon_vma_fork+0xb1/0x2b0 06:27:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000004900034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000052c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3513.833305][T21769] __should_failslab+0x81/0x90 [ 3513.838082][T21769] should_failslab+0x5/0x20 [ 3513.842609][T21769] kmem_cache_alloc+0x46/0x2f0 [ 3513.847457][T21769] anon_vma_fork+0xb1/0x2b0 [ 3513.851966][T21769] dup_mmap+0x49c/0x9c0 [ 3513.856205][T21769] dup_mm+0x7c/0x210 [ 3513.860098][T21769] copy_process+0x1203/0x2e00 [ 3513.864774][T21769] kernel_clone+0x14b/0x680 [ 3513.869351][T21769] __se_sys_clone3+0x194/0x1d0 [ 3513.874112][T21769] ? __cond_resched+0x11/0x40 [ 3513.878788][T21769] ? perf_trace_sys_exit+0x4d/0x160 06:27:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000062c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3513.884003][T21769] ? fput+0x2d/0x130 [ 3513.887963][T21769] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3513.894077][T21769] ? syscall_trace_enter+0x153/0x290 [ 3513.899355][T21769] ? exit_to_user_mode_prepare+0x65/0x190 [ 3513.905098][T21769] __x64_sys_clone3+0x2d/0x40 [ 3513.909816][T21769] do_syscall_64+0x4a/0x90 [ 3513.914251][T21769] ? irqentry_exit_to_user_mode+0x5/0x20 [ 3513.919874][T21769] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3513.925776][T21769] RIP: 0033:0x4665d9 [ 3513.929660][T21769] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3513.949348][T21769] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3513.957823][T21769] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3513.965786][T21769] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3513.973752][T21769] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:27:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300114700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300124700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000004a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3513.981719][T21769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3513.989697][T21769] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000072c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:48 executing program 2 (fault-call:3 fault-nth:45): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r4}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:48 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r1, 0x0) 06:27:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034702bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000082c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3514.090162][T21806] FAULT_INJECTION: forcing a failure. [ 3514.090162][T21806] name failslab, interval 1, probability 0, space 0, times 0 [ 3514.102822][T21806] CPU: 0 PID: 21806 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3514.112976][T21806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3514.123076][T21806] Call Trace: [ 3514.126347][T21806] dump_stack+0x137/0x19d [ 3514.130676][T21806] should_fail+0x23c/0x250 [ 3514.135094][T21806] ? anon_vma_clone+0x8d/0x380 06:27:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000092c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000004c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3514.139906][T21806] __should_failslab+0x81/0x90 [ 3514.144734][T21806] should_failslab+0x5/0x20 [ 3514.149270][T21806] kmem_cache_alloc+0x46/0x2f0 [ 3514.154112][T21806] ? avc_has_perm_noaudit+0x19a/0x240 [ 3514.159489][T21806] anon_vma_clone+0x8d/0x380 [ 3514.164083][T21806] anon_vma_fork+0x54/0x2b0 [ 3514.168616][T21806] dup_mmap+0x49c/0x9c0 [ 3514.172788][T21806] dup_mm+0x7c/0x210 [ 3514.176674][T21806] copy_process+0x1203/0x2e00 [ 3514.181412][T21806] kernel_clone+0x14b/0x680 [ 3514.185913][T21806] __se_sys_clone3+0x194/0x1d0 [ 3514.190686][T21806] ? __cond_resched+0x11/0x40 [ 3514.193839][T21822] selinux_netlink_send: 2 callbacks suppressed [ 3514.193852][T21822] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=76 sclass=netlink_route_socket pid=21822 comm=syz-executor.3 [ 3514.195361][T21806] ? perf_trace_sys_exit+0x4d/0x160 [ 3514.195387][T21806] ? fput+0x2d/0x130 [ 3514.223413][T21806] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3514.229492][T21806] ? syscall_trace_enter+0x153/0x290 [ 3514.234777][T21806] ? exit_to_user_mode_prepare+0x65/0x190 06:27:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000004e00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000a2c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3514.240489][T21806] __x64_sys_clone3+0x2d/0x40 [ 3514.245193][T21806] do_syscall_64+0x4a/0x90 [ 3514.249615][T21806] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3514.255509][T21806] RIP: 0033:0x4665d9 [ 3514.259538][T21806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3514.279208][T21806] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3514.287619][T21806] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3514.295649][T21806] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3514.303612][T21806] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3514.311602][T21806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3514.319582][T21806] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:48 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:48 executing program 2 (fault-call:3 fault-nth:46): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3514.338754][T21824] validate_nla: 94 callbacks suppressed [ 3514.338768][T21824] netlink: 'syz-executor.5': attribute type 17 has an invalid length. [ 3514.375316][T21819] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000004f00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000b2c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3514.398913][T21814] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3514.408363][T21838] FAULT_INJECTION: forcing a failure. [ 3514.408363][T21838] name failslab, interval 1, probability 0, space 0, times 0 [ 3514.420999][T21838] CPU: 0 PID: 21838 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3514.431194][T21838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3514.441243][T21838] Call Trace: [ 3514.444535][T21838] dump_stack+0x137/0x19d 06:27:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r4}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000c2c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3514.448913][T21838] should_fail+0x23c/0x250 [ 3514.453321][T21838] ? anon_vma_clone+0x8d/0x380 [ 3514.458152][T21838] __should_failslab+0x81/0x90 [ 3514.462941][T21838] should_failslab+0x5/0x20 [ 3514.467520][T21838] kmem_cache_alloc+0x46/0x2f0 [ 3514.472336][T21838] anon_vma_clone+0x8d/0x380 [ 3514.476906][T21838] anon_vma_fork+0x54/0x2b0 [ 3514.481441][T21838] dup_mmap+0x49c/0x9c0 [ 3514.485640][T21838] dup_mm+0x7c/0x210 [ 3514.489559][T21838] copy_process+0x1203/0x2e00 [ 3514.494263][T21838] kernel_clone+0x14b/0x680 [ 3514.498777][T21838] __se_sys_clone3+0x194/0x1d0 [ 3514.503610][T21838] ? __cond_resched+0x11/0x40 [ 3514.508358][T21838] ? perf_trace_sys_exit+0x4d/0x160 [ 3514.513555][T21838] ? fput+0x2d/0x130 [ 3514.517472][T21838] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3514.523679][T21838] ? syscall_trace_enter+0x153/0x290 [ 3514.529072][T21838] ? exit_to_user_mode_prepare+0x65/0x190 [ 3514.534788][T21838] __x64_sys_clone3+0x2d/0x40 [ 3514.539443][T21838] do_syscall_64+0x4a/0x90 [ 3514.543845][T21838] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3514.549754][T21838] RIP: 0033:0x4665d9 [ 3514.553652][T21838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3514.573271][T21838] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3514.581689][T21838] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3514.589655][T21838] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3514.597683][T21838] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3514.605765][T21838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3514.613745][T21838] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3514.632507][T21848] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 06:27:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034703bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005000034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:48 executing program 2 (fault-call:3 fault-nth:47): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000d2c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r4}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:48 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3514.656983][T21850] netlink: 'syz-executor.5': attribute type 17 has an invalid length. [ 3514.690502][T21859] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000e2c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005100034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3514.705655][T21859] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3514.732035][T21871] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 3514.745895][T21859] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3514.761602][T21875] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3514.767515][T21880] FAULT_INJECTION: forcing a failure. [ 3514.767515][T21880] name failslab, interval 1, probability 0, space 0, times 0 [ 3514.782269][T21880] CPU: 1 PID: 21880 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3514.792437][T21880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3514.802500][T21880] Call Trace: [ 3514.805772][T21880] dump_stack+0x137/0x19d [ 3514.810155][T21880] should_fail+0x23c/0x250 [ 3514.814566][T21880] ? anon_vma_clone+0x8d/0x380 [ 3514.819323][T21880] __should_failslab+0x81/0x90 [ 3514.824091][T21880] should_failslab+0x5/0x20 [ 3514.828595][T21880] kmem_cache_alloc+0x46/0x2f0 [ 3514.833406][T21880] anon_vma_clone+0x8d/0x380 [ 3514.837994][T21880] anon_vma_fork+0x54/0x2b0 [ 3514.842493][T21880] dup_mmap+0x49c/0x9c0 [ 3514.846650][T21880] dup_mm+0x7c/0x210 [ 3514.850541][T21880] copy_process+0x1203/0x2e00 [ 3514.855386][T21880] kernel_clone+0x14b/0x680 [ 3514.859889][T21880] __se_sys_clone3+0x194/0x1d0 [ 3514.864649][T21880] ? __cond_resched+0x11/0x40 [ 3514.869388][T21880] ? perf_trace_sys_exit+0x4d/0x160 [ 3514.874594][T21880] ? fput+0x2d/0x130 [ 3514.878539][T21880] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3514.884647][T21880] ? syscall_trace_enter+0x153/0x290 [ 3514.889940][T21880] ? exit_to_user_mode_prepare+0x65/0x190 [ 3514.895681][T21880] __x64_sys_clone3+0x2d/0x40 [ 3514.900351][T21880] do_syscall_64+0x4a/0x90 [ 3514.904774][T21880] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3514.910720][T21880] RIP: 0033:0x4665d9 [ 3514.914599][T21880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3514.934238][T21880] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3514.942645][T21880] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3514.950621][T21880] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 06:27:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000102c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034704bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:48 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005200034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005500034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3514.958666][T21880] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3514.966666][T21880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3514.974629][T21880] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:49 executing program 2 (fault-call:3 fault-nth:48): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000112c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3515.076482][T21914] FAULT_INJECTION: forcing a failure. [ 3515.076482][T21914] name failslab, interval 1, probability 0, space 0, times 0 [ 3515.089197][T21914] CPU: 0 PID: 21914 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3515.099335][T21914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3515.109378][T21914] Call Trace: [ 3515.112668][T21914] dump_stack+0x137/0x19d [ 3515.117104][T21914] should_fail+0x23c/0x250 [ 3515.121599][T21914] ? anon_vma_fork+0xb1/0x2b0 06:27:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000122c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034705bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005600034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@private1, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000252c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3515.126277][T21914] __should_failslab+0x81/0x90 [ 3515.131043][T21914] should_failslab+0x5/0x20 [ 3515.135538][T21914] kmem_cache_alloc+0x46/0x2f0 [ 3515.140316][T21914] anon_vma_fork+0xb1/0x2b0 [ 3515.144900][T21914] dup_mmap+0x49c/0x9c0 [ 3515.149151][T21914] dup_mm+0x7c/0x210 [ 3515.153036][T21914] copy_process+0x1203/0x2e00 [ 3515.157752][T21914] kernel_clone+0x14b/0x680 [ 3515.162314][T21914] __se_sys_clone3+0x194/0x1d0 [ 3515.167121][T21914] ? __cond_resched+0x11/0x40 [ 3515.171794][T21914] ? perf_trace_sys_exit+0x4d/0x160 06:27:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3515.176990][T21914] ? fput+0x2d/0x130 [ 3515.180884][T21914] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3515.186962][T21914] ? syscall_trace_enter+0x153/0x290 [ 3515.192245][T21914] ? exit_to_user_mode_prepare+0x65/0x190 [ 3515.198055][T21914] __x64_sys_clone3+0x2d/0x40 [ 3515.202730][T21914] do_syscall_64+0x4a/0x90 [ 3515.207313][T21914] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3515.213289][T21914] RIP: 0033:0x4665d9 06:27:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000482c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3515.217287][T21914] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3515.236890][T21914] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3515.245301][T21914] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3515.253268][T21914] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3515.261236][T21914] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3515.269397][T21914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3515.277360][T21914] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:49 executing program 2 (fault-call:3 fault-nth:49): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@private1, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034706bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900004c2c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005900034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3515.323767][T21938] __nla_validate_parse: 9 callbacks suppressed [ 3515.323781][T21938] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3515.398595][T21954] FAULT_INJECTION: forcing a failure. [ 3515.398595][T21954] name failslab, interval 1, probability 0, space 0, times 0 [ 3515.411263][T21954] CPU: 1 PID: 21954 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3515.421480][T21954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3515.431628][T21954] Call Trace: [ 3515.434901][T21954] dump_stack+0x137/0x19d [ 3515.439253][T21954] should_fail+0x23c/0x250 [ 3515.443659][T21954] ? anon_vma_fork+0x117/0x2b0 [ 3515.448423][T21954] __should_failslab+0x81/0x90 [ 3515.453187][T21954] should_failslab+0x5/0x20 [ 3515.457740][T21954] kmem_cache_alloc+0x46/0x2f0 [ 3515.462546][T21954] ? anon_vma_fork+0xb1/0x2b0 [ 3515.467239][T21954] anon_vma_fork+0x117/0x2b0 [ 3515.471826][T21954] dup_mmap+0x49c/0x9c0 [ 3515.475999][T21954] dup_mm+0x7c/0x210 [ 3515.479887][T21954] copy_process+0x1203/0x2e00 [ 3515.484559][T21954] kernel_clone+0x14b/0x680 [ 3515.489055][T21954] __se_sys_clone3+0x194/0x1d0 [ 3515.493882][T21954] ? __cond_resched+0x11/0x40 06:27:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000602c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@private1, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034707bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3515.498617][T21954] ? perf_trace_sys_exit+0x4d/0x160 [ 3515.503841][T21954] ? fput+0x2d/0x130 [ 3515.507728][T21954] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3515.513793][T21954] ? syscall_trace_enter+0x153/0x290 [ 3515.519083][T21954] ? exit_to_user_mode_prepare+0x65/0x190 [ 3515.524798][T21954] __x64_sys_clone3+0x2d/0x40 [ 3515.529470][T21954] do_syscall_64+0x4a/0x90 [ 3515.533883][T21954] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3515.539772][T21954] RIP: 0033:0x4665d9 06:27:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000682c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3515.543655][T21954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3515.563401][T21954] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3515.571843][T21954] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3515.579890][T21954] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3515.587853][T21954] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:27:49 executing program 2 (fault-call:3 fault-nth:50): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900006c2c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3515.595840][T21954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3515.603834][T21954] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034708bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000742c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3515.724564][T21997] FAULT_INJECTION: forcing a failure. [ 3515.724564][T21997] name failslab, interval 1, probability 0, space 0, times 0 [ 3515.737225][T21997] CPU: 0 PID: 21997 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3515.747462][T21997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3515.757524][T21997] Call Trace: [ 3515.760793][T21997] dump_stack+0x137/0x19d [ 3515.765256][T21997] should_fail+0x23c/0x250 [ 3515.769772][T21997] ? anon_vma_fork+0xb1/0x2b0 [ 3515.774484][T21997] __should_failslab+0x81/0x90 [ 3515.779249][T21997] should_failslab+0x5/0x20 [ 3515.783774][T21997] kmem_cache_alloc+0x46/0x2f0 [ 3515.788582][T21997] anon_vma_fork+0xb1/0x2b0 [ 3515.793081][T21997] dup_mmap+0x49c/0x9c0 [ 3515.797235][T21997] dup_mm+0x7c/0x210 [ 3515.801119][T21997] copy_process+0x1203/0x2e00 [ 3515.805866][T21997] kernel_clone+0x14b/0x680 [ 3515.810383][T21997] __se_sys_clone3+0x194/0x1d0 [ 3515.815207][T21997] ? __cond_resched+0x11/0x40 [ 3515.819927][T21997] ? perf_trace_sys_exit+0x4d/0x160 06:27:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034709bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900007a2c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:49 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005e00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3515.825135][T21997] ? fput+0x2d/0x130 [ 3515.829127][T21997] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3515.835202][T21997] ? syscall_trace_enter+0x153/0x290 [ 3515.840619][T21997] ? exit_to_user_mode_prepare+0x65/0x190 [ 3515.846335][T21997] __x64_sys_clone3+0x2d/0x40 [ 3515.851003][T21997] do_syscall_64+0x4a/0x90 [ 3515.855463][T21997] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3515.861431][T21997] RIP: 0033:0x4665d9 [ 3515.865353][T21997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3515.885107][T21997] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3515.893538][T21997] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3515.901524][T21997] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3515.909473][T21997] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3515.917423][T21997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 06:27:50 executing program 2 (fault-call:3 fault-nth:51): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006000034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007700034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3515.925443][T21997] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130003470abb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3515.987860][T22025] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=22025 comm=syz-executor.1 [ 3516.004400][T22022] FAULT_INJECTION: forcing a failure. [ 3516.004400][T22022] name failslab, interval 1, probability 0, space 0, times 0 [ 3516.017025][T22022] CPU: 0 PID: 22022 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3516.027170][T22022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 06:27:50 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3516.037215][T22022] Call Trace: [ 3516.040487][T22022] dump_stack+0x137/0x19d [ 3516.044909][T22022] should_fail+0x23c/0x250 [ 3516.049349][T22022] ? anon_vma_fork+0x117/0x2b0 [ 3516.054148][T22022] __should_failslab+0x81/0x90 [ 3516.058941][T22022] should_failslab+0x5/0x20 [ 3516.063440][T22022] kmem_cache_alloc+0x46/0x2f0 [ 3516.068223][T22022] ? anon_vma_fork+0xb1/0x2b0 [ 3516.072901][T22022] anon_vma_fork+0x117/0x2b0 [ 3516.077553][T22022] dup_mmap+0x49c/0x9c0 [ 3516.081704][T22022] dup_mm+0x7c/0x210 06:27:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001000034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3516.085592][T22022] copy_process+0x1203/0x2e00 [ 3516.090264][T22022] kernel_clone+0x14b/0x680 [ 3516.094775][T22022] __se_sys_clone3+0x194/0x1d0 [ 3516.099535][T22022] ? __cond_resched+0x11/0x40 [ 3516.104211][T22022] ? perf_trace_sys_exit+0x4d/0x160 [ 3516.109406][T22022] ? fput+0x2d/0x130 [ 3516.113301][T22022] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3516.119519][T22022] ? syscall_trace_enter+0x153/0x290 [ 3516.124947][T22022] ? exit_to_user_mode_prepare+0x65/0x190 [ 3516.130669][T22022] __x64_sys_clone3+0x2d/0x40 [ 3516.131262][T22039] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=99 sclass=netlink_route_socket pid=22039 comm=syz-executor.3 [ 3516.135342][T22022] do_syscall_64+0x4a/0x90 [ 3516.135370][T22022] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3516.135396][T22022] RIP: 0033:0x4665d9 [ 3516.162543][T22022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 06:27:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000026400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:50 executing program 2 (fault-call:3 fault-nth:52): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3516.182184][T22022] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3516.190591][T22022] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3516.198556][T22022] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3516.206525][T22022] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3516.214579][T22022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3516.222542][T22022] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:50 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:50 executing program 5: writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000200)={@private1, 0x0, r2}) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130003470bbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001100034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000036400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:50 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3516.319470][T22055] FAULT_INJECTION: forcing a failure. [ 3516.319470][T22055] name failslab, interval 1, probability 0, space 0, times 0 [ 3516.332124][T22055] CPU: 1 PID: 22055 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3516.342304][T22055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3516.352498][T22055] Call Trace: [ 3516.355766][T22055] dump_stack+0x137/0x19d [ 3516.360089][T22055] should_fail+0x23c/0x250 [ 3516.364500][T22055] ? dup_mmap+0x38e/0x9c0 06:27:50 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000046400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001200034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3516.368839][T22055] __should_failslab+0x81/0x90 [ 3516.373610][T22055] should_failslab+0x5/0x20 [ 3516.378105][T22055] kmem_cache_alloc+0x46/0x2f0 [ 3516.382910][T22055] dup_mmap+0x38e/0x9c0 [ 3516.387063][T22055] dup_mm+0x7c/0x210 [ 3516.390949][T22055] copy_process+0x1203/0x2e00 [ 3516.395620][T22055] kernel_clone+0x14b/0x680 [ 3516.400128][T22055] __se_sys_clone3+0x194/0x1d0 [ 3516.404935][T22055] ? __cond_resched+0x11/0x40 [ 3516.409610][T22055] ? perf_trace_sys_exit+0x4d/0x160 [ 3516.414910][T22055] ? fput+0x2d/0x130 06:27:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000056400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3516.418858][T22055] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3516.425000][T22055] ? syscall_trace_enter+0x153/0x290 [ 3516.430290][T22055] ? exit_to_user_mode_prepare+0x65/0x190 [ 3516.436001][T22055] __x64_sys_clone3+0x2d/0x40 [ 3516.440686][T22055] do_syscall_64+0x4a/0x90 [ 3516.445119][T22055] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3516.451017][T22055] RIP: 0033:0x4665d9 06:27:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000066400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3516.454897][T22055] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3516.474505][T22055] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3516.482915][T22055] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3516.490882][T22055] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3516.498912][T22055] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3516.506882][T22055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3516.514867][T22055] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:50 executing program 2 (fault-call:3 fault-nth:53): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:50 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000076400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:50 executing program 5: writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000200)={@private1, 0x0, r2}) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130003470cbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000086400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3516.620037][T22090] FAULT_INJECTION: forcing a failure. [ 3516.620037][T22090] name failslab, interval 1, probability 0, space 0, times 0 [ 3516.632702][T22090] CPU: 0 PID: 22090 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3516.642848][T22090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3516.652892][T22090] Call Trace: [ 3516.656165][T22090] dump_stack+0x137/0x19d [ 3516.660521][T22090] should_fail+0x23c/0x250 [ 3516.664933][T22090] ? anon_vma_clone+0x8d/0x380 [ 3516.669746][T22090] __should_failslab+0x81/0x90 [ 3516.674503][T22090] should_failslab+0x5/0x20 [ 3516.679000][T22090] kmem_cache_alloc+0x46/0x2f0 [ 3516.683769][T22090] anon_vma_clone+0x8d/0x380 [ 3516.688359][T22090] anon_vma_fork+0x54/0x2b0 [ 3516.692928][T22090] dup_mmap+0x49c/0x9c0 [ 3516.697081][T22090] dup_mm+0x7c/0x210 [ 3516.700972][T22090] copy_process+0x1203/0x2e00 [ 3516.705705][T22090] kernel_clone+0x14b/0x680 [ 3516.710240][T22090] __se_sys_clone3+0x194/0x1d0 [ 3516.714998][T22090] ? __cond_resched+0x11/0x40 06:27:50 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130003470dbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000096400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3516.719686][T22090] ? perf_trace_sys_exit+0x4d/0x160 [ 3516.724878][T22090] ? fput+0x2d/0x130 [ 3516.728780][T22090] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3516.734858][T22090] ? syscall_trace_enter+0x153/0x290 [ 3516.740172][T22090] ? exit_to_user_mode_prepare+0x65/0x190 [ 3516.745889][T22090] __x64_sys_clone3+0x2d/0x40 [ 3516.750688][T22090] do_syscall_64+0x4a/0x90 [ 3516.755120][T22090] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3516.761046][T22090] RIP: 0033:0x4665d9 06:27:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001500034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3516.764971][T22090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3516.784592][T22090] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3516.793000][T22090] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3516.800966][T22090] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3516.808926][T22090] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3516.816975][T22090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3516.825007][T22090] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:51 executing program 2 (fault-call:3 fault-nth:54): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001600034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:51 executing program 5: writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000200)={@private1, 0x0, r2}) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000a6400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130003470ebb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:51 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3516.937051][T22135] FAULT_INJECTION: forcing a failure. [ 3516.937051][T22135] name failslab, interval 1, probability 0, space 0, times 0 [ 3516.949712][T22135] CPU: 1 PID: 22135 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3516.959891][T22135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3516.969942][T22135] Call Trace: [ 3516.973229][T22135] dump_stack+0x137/0x19d [ 3516.977742][T22135] should_fail+0x23c/0x250 [ 3516.982160][T22135] ? anon_vma_clone+0x8d/0x380 06:27:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000b6400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034710bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3516.986954][T22135] __should_failslab+0x81/0x90 [ 3516.991715][T22135] should_failslab+0x5/0x20 [ 3516.996212][T22135] kmem_cache_alloc+0x46/0x2f0 [ 3517.000974][T22135] anon_vma_clone+0x8d/0x380 [ 3517.005570][T22135] anon_vma_fork+0x54/0x2b0 [ 3517.010161][T22135] dup_mmap+0x49c/0x9c0 [ 3517.014307][T22135] dup_mm+0x7c/0x210 [ 3517.018192][T22135] copy_process+0x1203/0x2e00 [ 3517.022927][T22135] kernel_clone+0x14b/0x680 [ 3517.027534][T22135] __se_sys_clone3+0x194/0x1d0 [ 3517.032309][T22135] ? __cond_resched+0x11/0x40 06:27:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000c6400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3517.036978][T22135] ? perf_trace_sys_exit+0x4d/0x160 [ 3517.042182][T22135] ? fput+0x2d/0x130 [ 3517.046074][T22135] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3517.052206][T22135] ? syscall_trace_enter+0x153/0x290 [ 3517.057617][T22135] ? exit_to_user_mode_prepare+0x65/0x190 [ 3517.063334][T22135] __x64_sys_clone3+0x2d/0x40 [ 3517.068009][T22135] do_syscall_64+0x4a/0x90 [ 3517.072460][T22135] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3517.078353][T22135] RIP: 0033:0x4665d9 06:27:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000d6400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3517.082239][T22135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3517.101886][T22135] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3517.110395][T22135] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3517.118375][T22135] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3517.126336][T22135] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:27:51 executing program 2 (fault-call:3 fault-nth:55): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001900034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3517.134385][T22135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3517.142350][T22135] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000e6400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:51 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034711bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3517.233116][T22164] FAULT_INJECTION: forcing a failure. [ 3517.233116][T22164] name failslab, interval 1, probability 0, space 0, times 0 [ 3517.245894][T22164] CPU: 0 PID: 22164 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3517.256083][T22164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3517.266273][T22164] Call Trace: [ 3517.269548][T22164] dump_stack+0x137/0x19d [ 3517.273888][T22164] should_fail+0x23c/0x250 [ 3517.278371][T22164] ? anon_vma_clone+0x8d/0x380 [ 3517.283136][T22164] __should_failslab+0x81/0x90 [ 3517.287901][T22164] should_failslab+0x5/0x20 [ 3517.292484][T22164] kmem_cache_alloc+0x46/0x2f0 [ 3517.297335][T22164] anon_vma_clone+0x8d/0x380 [ 3517.301926][T22164] anon_vma_fork+0x54/0x2b0 [ 3517.306437][T22164] dup_mmap+0x49c/0x9c0 [ 3517.310592][T22164] dup_mm+0x7c/0x210 [ 3517.314553][T22164] copy_process+0x1203/0x2e00 [ 3517.319250][T22164] kernel_clone+0x14b/0x680 [ 3517.323760][T22164] __se_sys_clone3+0x194/0x1d0 [ 3517.328603][T22164] ? __cond_resched+0x11/0x40 06:27:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3517.333313][T22164] ? perf_trace_sys_exit+0x4d/0x160 [ 3517.338515][T22164] ? fput+0x2d/0x130 [ 3517.342493][T22164] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3517.348612][T22164] ? syscall_trace_enter+0x153/0x290 [ 3517.353939][T22164] ? exit_to_user_mode_prepare+0x65/0x190 [ 3517.359825][T22164] __x64_sys_clone3+0x2d/0x40 [ 3517.364498][T22164] do_syscall_64+0x4a/0x90 [ 3517.368950][T22164] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3517.374868][T22164] RIP: 0033:0x4665d9 [ 3517.378756][T22164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3517.398373][T22164] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3517.406797][T22164] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3517.414828][T22164] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3517.422876][T22164] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:27:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000106400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3517.430867][T22164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3517.438829][T22164] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:51 executing program 2 (fault-call:3 fault-nth:56): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:51 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r1, 0x0) 06:27:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000116400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034712bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3517.554507][T22195] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3517.565724][T22193] FAULT_INJECTION: forcing a failure. [ 3517.565724][T22193] name failslab, interval 1, probability 0, space 0, times 0 [ 3517.578411][T22193] CPU: 0 PID: 22193 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3517.588690][T22193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3517.598731][T22193] Call Trace: 06:27:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3517.602001][T22193] dump_stack+0x137/0x19d [ 3517.606334][T22193] should_fail+0x23c/0x250 [ 3517.610780][T22193] ? anon_vma_fork+0x117/0x2b0 [ 3517.615543][T22193] __should_failslab+0x81/0x90 [ 3517.620311][T22193] should_failslab+0x5/0x20 [ 3517.624825][T22193] kmem_cache_alloc+0x46/0x2f0 [ 3517.629612][T22193] ? anon_vma_fork+0xb1/0x2b0 [ 3517.634364][T22193] anon_vma_fork+0x117/0x2b0 [ 3517.638990][T22193] dup_mmap+0x49c/0x9c0 [ 3517.643212][T22193] dup_mm+0x7c/0x210 [ 3517.647095][T22193] copy_process+0x1203/0x2e00 [ 3517.651767][T22193] kernel_clone+0x14b/0x680 [ 3517.656262][T22193] __se_sys_clone3+0x194/0x1d0 [ 3517.661110][T22193] ? __cond_resched+0x11/0x40 [ 3517.665885][T22193] ? perf_trace_sys_exit+0x4d/0x160 [ 3517.671089][T22193] ? fput+0x2d/0x130 [ 3517.675062][T22193] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3517.681210][T22193] ? syscall_trace_enter+0x153/0x290 [ 3517.686505][T22193] ? exit_to_user_mode_prepare+0x65/0x190 [ 3517.692288][T22193] __x64_sys_clone3+0x2d/0x40 [ 3517.696968][T22193] do_syscall_64+0x4a/0x90 [ 3517.701380][T22193] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3517.707333][T22193] RIP: 0033:0x4665d9 [ 3517.711245][T22193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3517.730857][T22193] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3517.739269][T22193] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3517.747262][T22193] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 06:27:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000126400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3517.755224][T22193] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3517.763188][T22193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3517.771150][T22193] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001d00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034716bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:52 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r1, 0x0) 06:27:52 executing program 2 (fault-call:3 fault-nth:57): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000256400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001e00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:52 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r1, 0x0) 06:27:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034717bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3517.977809][T22227] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3517.999722][T22231] FAULT_INJECTION: forcing a failure. [ 3517.999722][T22231] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3518.013032][T22231] CPU: 0 PID: 22231 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 06:27:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180), 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000486400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002100034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3518.023175][T22231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3518.033221][T22231] Call Trace: [ 3518.036502][T22231] dump_stack+0x137/0x19d [ 3518.040862][T22231] should_fail+0x23c/0x250 [ 3518.045272][T22231] __alloc_pages+0x102/0x320 [ 3518.049869][T22231] alloc_pages+0x21d/0x310 [ 3518.054280][T22231] pte_alloc_one+0x29/0xb0 [ 3518.058695][T22231] __pte_alloc+0x2f/0x210 [ 3518.063020][T22231] copy_pte_range+0x128e/0x1460 [ 3518.067866][T22231] ? __alloc_pages+0x194/0x320 [ 3518.072651][T22231] ? vma_interval_tree_augment_rotate+0x100/0x100 [ 3518.079065][T22231] copy_page_range+0x5da/0x8e0 [ 3518.083833][T22231] ? anon_vma_fork+0x273/0x2b0 [ 3518.088598][T22231] dup_mmap+0x6ab/0x9c0 [ 3518.092755][T22231] dup_mm+0x7c/0x210 [ 3518.096682][T22231] copy_process+0x1203/0x2e00 [ 3518.101360][T22231] kernel_clone+0x14b/0x680 [ 3518.105861][T22231] __se_sys_clone3+0x194/0x1d0 [ 3518.110633][T22231] ? __cond_resched+0x11/0x40 [ 3518.115309][T22231] ? perf_trace_sys_exit+0x4d/0x160 [ 3518.120507][T22231] ? fput+0x2d/0x130 06:27:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900004c6400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3518.124391][T22231] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3518.130468][T22231] ? syscall_trace_enter+0x153/0x290 [ 3518.135785][T22231] ? exit_to_user_mode_prepare+0x65/0x190 [ 3518.141514][T22231] __x64_sys_clone3+0x2d/0x40 [ 3518.146186][T22231] do_syscall_64+0x4a/0x90 [ 3518.150611][T22231] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3518.156508][T22231] RIP: 0033:0x4665d9 06:27:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000606400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3518.160413][T22231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3518.180044][T22231] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3518.188454][T22231] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3518.196419][T22231] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3518.204381][T22231] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3518.212367][T22231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3518.220376][T22231] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180), 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:52 executing program 2 (fault-call:3 fault-nth:58): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000686400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002200034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034718bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:52 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900006c6400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180), 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000746400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130003471ebb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3518.350748][T22267] FAULT_INJECTION: forcing a failure. [ 3518.350748][T22267] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3518.364101][T22267] CPU: 0 PID: 22267 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3518.374244][T22267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3518.384379][T22267] Call Trace: [ 3518.387667][T22267] dump_stack+0x137/0x19d [ 3518.392177][T22267] should_fail+0x23c/0x250 06:27:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002500034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3518.392212][T22273] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3518.396590][T22267] __alloc_pages+0x102/0x320 [ 3518.396613][T22267] alloc_pages+0x21d/0x310 [ 3518.396632][T22267] pte_alloc_one+0x29/0xb0 [ 3518.419255][T22267] __pte_alloc+0x2f/0x210 [ 3518.423579][T22267] copy_pte_range+0x128e/0x1460 [ 3518.428438][T22267] ? __alloc_pages+0x194/0x320 [ 3518.433203][T22267] copy_page_range+0x5da/0x8e0 [ 3518.437982][T22267] ? anon_vma_fork+0x273/0x2b0 [ 3518.442858][T22267] dup_mmap+0x6ab/0x9c0 [ 3518.446994][T22267] dup_mm+0x7c/0x210 [ 3518.450873][T22267] copy_process+0x1203/0x2e00 [ 3518.455523][T22267] kernel_clone+0x14b/0x680 [ 3518.460003][T22267] __se_sys_clone3+0x194/0x1d0 [ 3518.464744][T22267] ? __cond_resched+0x11/0x40 [ 3518.469441][T22267] ? perf_trace_sys_exit+0x4d/0x160 [ 3518.474627][T22267] ? fput+0x2d/0x130 [ 3518.478534][T22267] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3518.484602][T22267] ? syscall_trace_enter+0x153/0x290 [ 3518.489969][T22267] ? exit_to_user_mode_prepare+0x65/0x190 [ 3518.495703][T22267] __x64_sys_clone3+0x2d/0x40 [ 3518.500406][T22267] do_syscall_64+0x4a/0x90 [ 3518.504812][T22267] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3518.510723][T22267] RIP: 0033:0x4665d9 [ 3518.514604][T22267] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3518.534214][T22267] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3518.542657][T22267] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 06:27:52 executing program 2 (fault-call:3 fault-nth:59): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3518.550638][T22267] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3518.558611][T22267] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3518.566569][T22267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3518.574530][T22267] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{0x0}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:52 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3518.636770][T22284] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3518.640891][T22288] FAULT_INJECTION: forcing a failure. [ 3518.640891][T22288] name failslab, interval 1, probability 0, space 0, times 0 [ 3518.658702][T22288] CPU: 0 PID: 22288 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3518.668846][T22288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3518.678888][T22288] Call Trace: [ 3518.682193][T22288] dump_stack+0x137/0x19d 06:27:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900007a6400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3518.686529][T22288] should_fail+0x23c/0x250 [ 3518.691024][T22288] ? anon_vma_clone+0x8d/0x380 [ 3518.695811][T22288] __should_failslab+0x81/0x90 [ 3518.700592][T22288] should_failslab+0x5/0x20 [ 3518.705147][T22288] kmem_cache_alloc+0x46/0x2f0 [ 3518.710000][T22288] ? avc_has_perm_noaudit+0x19a/0x240 [ 3518.715475][T22288] anon_vma_clone+0x8d/0x380 [ 3518.720063][T22288] anon_vma_fork+0x54/0x2b0 [ 3518.724563][T22288] dup_mmap+0x49c/0x9c0 [ 3518.728726][T22288] dup_mm+0x7c/0x210 [ 3518.732609][T22288] copy_process+0x1203/0x2e00 06:27:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002600034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3518.737294][T22288] kernel_clone+0x14b/0x680 [ 3518.741867][T22288] __se_sys_clone3+0x194/0x1d0 [ 3518.746682][T22288] ? __cond_resched+0x11/0x40 [ 3518.751394][T22288] ? perf_trace_sys_exit+0x4d/0x160 [ 3518.756660][T22288] ? fput+0x2d/0x130 [ 3518.760622][T22288] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3518.766708][T22288] ? syscall_trace_enter+0x153/0x290 [ 3518.772060][T22288] ? exit_to_user_mode_prepare+0x65/0x190 [ 3518.777833][T22288] __x64_sys_clone3+0x2d/0x40 [ 3518.782520][T22288] do_syscall_64+0x4a/0x90 [ 3518.786964][T22288] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3518.792900][T22288] RIP: 0033:0x4665d9 [ 3518.796785][T22288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3518.816413][T22288] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3518.824817][T22288] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 06:27:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{0x0}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3518.832778][T22288] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3518.840794][T22288] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3518.848758][T22288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3518.856726][T22288] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3518.874761][T22303] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. 06:27:53 executing program 2 (fault-call:3 fault-nth:60): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006600034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034722bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3518.941779][T22316] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3518.954892][T22320] FAULT_INJECTION: forcing a failure. [ 3518.954892][T22320] name failslab, interval 1, probability 0, space 0, times 0 [ 3518.967538][T22320] CPU: 1 PID: 22320 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3518.977715][T22320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3518.987764][T22320] Call Trace: 06:27:53 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002900034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{0x0}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3518.991034][T22320] dump_stack+0x137/0x19d [ 3518.995373][T22320] should_fail+0x23c/0x250 [ 3518.999821][T22320] ? anon_vma_clone+0x8d/0x380 [ 3519.004612][T22320] __should_failslab+0x81/0x90 [ 3519.009397][T22320] should_failslab+0x5/0x20 [ 3519.013896][T22320] kmem_cache_alloc+0x46/0x2f0 [ 3519.018703][T22320] ? avc_has_perm_noaudit+0x19a/0x240 [ 3519.024200][T22320] anon_vma_clone+0x8d/0x380 [ 3519.028800][T22320] anon_vma_fork+0x54/0x2b0 [ 3519.033328][T22320] dup_mmap+0x49c/0x9c0 [ 3519.037492][T22320] dup_mm+0x7c/0x210 [ 3519.041376][T22320] copy_process+0x1203/0x2e00 [ 3519.046048][T22320] kernel_clone+0x14b/0x680 [ 3519.050547][T22320] __se_sys_clone3+0x194/0x1d0 [ 3519.055320][T22320] ? __cond_resched+0x11/0x40 [ 3519.060048][T22320] ? perf_trace_sys_exit+0x4d/0x160 [ 3519.065321][T22320] ? fput+0x2d/0x130 [ 3519.069240][T22320] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3519.075313][T22320] ? syscall_trace_enter+0x153/0x290 [ 3519.080614][T22320] ? exit_to_user_mode_prepare+0x65/0x190 [ 3519.086334][T22320] __x64_sys_clone3+0x2d/0x40 [ 3519.091034][T22320] do_syscall_64+0x4a/0x90 [ 3519.095459][T22320] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3519.101347][T22320] RIP: 0033:0x4665d9 [ 3519.105326][T22320] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3519.124917][T22320] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3519.133323][T22320] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3519.141439][T22320] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3519.149400][T22320] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3519.157356][T22320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3519.165305][T22320] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3519.180900][T22328] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. 06:27:53 executing program 2 (fault-call:3 fault-nth:61): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034724bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3519.190370][T22323] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 06:27:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034725bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3519.252527][T22340] FAULT_INJECTION: forcing a failure. [ 3519.252527][T22340] name failslab, interval 1, probability 0, space 0, times 0 [ 3519.265151][T22340] CPU: 1 PID: 22340 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3519.275909][T22340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3519.280740][T22345] netlink: 33 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3519.285994][T22340] Call Trace: [ 3519.286003][T22340] dump_stack+0x137/0x19d 06:27:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006900034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3519.302854][T22340] should_fail+0x23c/0x250 [ 3519.307310][T22340] ? anon_vma_clone+0x8d/0x380 [ 3519.312073][T22340] __should_failslab+0x81/0x90 [ 3519.316847][T22340] should_failslab+0x5/0x20 [ 3519.321327][T22340] kmem_cache_alloc+0x46/0x2f0 [ 3519.326087][T22340] anon_vma_clone+0x8d/0x380 [ 3519.330700][T22340] anon_vma_fork+0x54/0x2b0 [ 3519.335210][T22340] dup_mmap+0x49c/0x9c0 [ 3519.339367][T22340] dup_mm+0x7c/0x210 [ 3519.343255][T22340] copy_process+0x1203/0x2e00 [ 3519.347922][T22340] kernel_clone+0x14b/0x680 [ 3519.352424][T22340] __se_sys_clone3+0x194/0x1d0 [ 3519.357244][T22340] ? __cond_resched+0x11/0x40 [ 3519.361919][T22340] ? perf_trace_sys_exit+0x4d/0x160 [ 3519.367329][T22340] ? fput+0x2d/0x130 [ 3519.371253][T22340] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3519.377309][T22340] ? syscall_trace_enter+0x153/0x290 [ 3519.382588][T22340] ? exit_to_user_mode_prepare+0x65/0x190 [ 3519.388303][T22340] __x64_sys_clone3+0x2d/0x40 [ 3519.392999][T22340] do_syscall_64+0x4a/0x90 [ 3519.397435][T22340] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3519.403391][T22340] RIP: 0033:0x4665d9 [ 3519.407265][T22340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3519.426917][T22340] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3519.435373][T22340] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3519.443333][T22340] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 06:27:53 executing program 2 (fault-call:3 fault-nth:62): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:53 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3519.451304][T22340] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3519.459264][T22340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3519.467229][T22340] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007700034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:53 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3519.527784][T22347] validate_nla: 108 callbacks suppressed [ 3519.527797][T22347] netlink: 'syz-executor.5': attribute type 17 has an invalid length. [ 3519.561808][T22366] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006f00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3519.582147][T22370] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=22370 comm=syz-executor.1 [ 3519.595629][T22369] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 3519.603738][T22366] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3519.612461][T22371] FAULT_INJECTION: forcing a failure. [ 3519.612461][T22371] name failslab, interval 1, probability 0, space 0, times 0 06:27:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002ce0004700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3519.625187][T22371] CPU: 1 PID: 22371 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3519.634949][T22380] netlink: 'syz-executor.5': attribute type 17 has an invalid length. [ 3519.635332][T22371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3519.635345][T22371] Call Trace: [ 3519.635354][T22371] dump_stack+0x137/0x19d [ 3519.655186][T22366] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3519.656861][T22371] should_fail+0x23c/0x250 [ 3519.656884][T22371] ? anon_vma_clone+0x8d/0x380 [ 3519.678384][T22371] __should_failslab+0x81/0x90 [ 3519.683205][T22371] should_failslab+0x5/0x20 [ 3519.687786][T22371] kmem_cache_alloc+0x46/0x2f0 [ 3519.692545][T22371] anon_vma_clone+0x8d/0x380 [ 3519.697161][T22371] anon_vma_fork+0x54/0x2b0 [ 3519.701715][T22371] dup_mmap+0x49c/0x9c0 [ 3519.705918][T22371] dup_mm+0x7c/0x210 [ 3519.709953][T22371] copy_process+0x1203/0x2e00 [ 3519.714637][T22371] kernel_clone+0x14b/0x680 [ 3519.719144][T22371] __se_sys_clone3+0x194/0x1d0 [ 3519.723899][T22371] ? __cond_resched+0x11/0x40 [ 3519.728572][T22371] ? perf_trace_sys_exit+0x4d/0x160 [ 3519.733776][T22371] ? fput+0x2d/0x130 [ 3519.737758][T22371] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3519.743875][T22371] ? syscall_trace_enter+0x153/0x290 [ 3519.749193][T22371] ? exit_to_user_mode_prepare+0x65/0x190 [ 3519.755067][T22371] __x64_sys_clone3+0x2d/0x40 [ 3519.759794][T22371] do_syscall_64+0x4a/0x90 [ 3519.764207][T22371] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3519.770147][T22371] RIP: 0033:0x4665d9 [ 3519.774027][T22371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3519.793618][T22371] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3519.802110][T22371] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3519.810064][T22371] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3519.818025][T22371] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:27:54 executing program 2 (fault-call:3 fault-nth:63): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3519.825987][T22371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3519.833938][T22371] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3519.863785][T22381] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034748bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:54 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3519.892503][T22388] FAULT_INJECTION: forcing a failure. [ 3519.892503][T22388] name failslab, interval 1, probability 0, space 0, times 0 [ 3519.905179][T22388] CPU: 1 PID: 22388 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3519.906983][T22390] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=111 sclass=netlink_route_socket pid=22390 comm=syz-executor.3 [ 3519.915411][T22388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3519.915426][T22388] Call Trace: 06:27:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007000034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3519.915434][T22388] dump_stack+0x137/0x19d [ 3519.946060][T22388] should_fail+0x23c/0x250 [ 3519.950516][T22388] ? anon_vma_fork+0xb1/0x2b0 [ 3519.954329][T22396] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3519.955220][T22388] __should_failslab+0x81/0x90 [ 3519.968032][T22388] should_failslab+0x5/0x20 [ 3519.972608][T22388] kmem_cache_alloc+0x46/0x2f0 [ 3519.977696][T22388] anon_vma_fork+0xb1/0x2b0 [ 3519.982213][T22388] dup_mmap+0x49c/0x9c0 [ 3519.986375][T22388] dup_mm+0x7c/0x210 06:27:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c0e014700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3519.990263][T22388] copy_process+0x1203/0x2e00 [ 3519.994948][T22388] kernel_clone+0x14b/0x680 [ 3519.999440][T22388] __se_sys_clone3+0x194/0x1d0 [ 3520.004258][T22388] ? __cond_resched+0x11/0x40 [ 3520.008937][T22388] ? perf_trace_sys_exit+0x4d/0x160 [ 3520.014134][T22388] ? fput+0x2d/0x130 [ 3520.018018][T22388] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3520.024119][T22388] ? syscall_trace_enter+0x153/0x290 [ 3520.029430][T22388] ? exit_to_user_mode_prepare+0x65/0x190 [ 3520.035230][T22388] __x64_sys_clone3+0x2d/0x40 [ 3520.039927][T22388] do_syscall_64+0x4a/0x90 [ 3520.044369][T22388] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3520.050349][T22388] RIP: 0033:0x4665d9 [ 3520.054238][T22388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3520.059504][T22410] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3628 sclass=netlink_route_socket pid=22410 comm=syz-executor.1 06:27:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c02034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3520.073835][T22388] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3520.073859][T22388] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3520.103299][T22388] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3520.111262][T22388] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3520.119221][T22388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3520.127183][T22388] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:54 executing program 2 (fault-call:3 fault-nth:64): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3520.143672][T22402] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3520.165912][T22412] netlink: 'syz-executor.5': attribute type 17 has an invalid length. [ 3520.191052][T22417] FAULT_INJECTION: forcing a failure. [ 3520.191052][T22417] name failslab, interval 1, probability 0, space 0, times 0 [ 3520.203672][T22417] CPU: 1 PID: 22417 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3520.212098][T22420] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=556 sclass=netlink_route_socket pid=22420 comm=syz-executor.1 [ 3520.213897][T22417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3520.237018][T22417] Call Trace: 06:27:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130003474cbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025", 0x1d}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c03034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3520.240289][T22417] dump_stack+0x137/0x19d [ 3520.244647][T22417] should_fail+0x23c/0x250 [ 3520.249104][T22417] ? anon_vma_fork+0x117/0x2b0 [ 3520.253952][T22417] __should_failslab+0x81/0x90 [ 3520.258727][T22417] should_failslab+0x5/0x20 [ 3520.263218][T22417] kmem_cache_alloc+0x46/0x2f0 [ 3520.267990][T22417] ? anon_vma_fork+0xb1/0x2b0 [ 3520.272687][T22417] anon_vma_fork+0x117/0x2b0 [ 3520.277270][T22417] dup_mmap+0x49c/0x9c0 [ 3520.281473][T22417] dup_mm+0x7c/0x210 [ 3520.281737][T22418] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=115 sclass=netlink_route_socket pid=22418 comm=syz-executor.3 [ 3520.285423][T22417] copy_process+0x1203/0x2e00 [ 3520.285459][T22417] kernel_clone+0x14b/0x680 [ 3520.285478][T22417] __se_sys_clone3+0x194/0x1d0 [ 3520.308338][T22429] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=812 sclass=netlink_route_socket pid=22429 comm=syz-executor.1 [ 3520.312240][T22417] ? __cond_resched+0x11/0x40 [ 3520.312275][T22417] ? perf_trace_sys_exit+0x4d/0x160 [ 3520.335020][T22417] ? fput+0x2d/0x130 06:27:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3520.338907][T22417] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3520.344971][T22417] ? syscall_trace_enter+0x153/0x290 [ 3520.350250][T22417] ? exit_to_user_mode_prepare+0x65/0x190 [ 3520.355958][T22417] __x64_sys_clone3+0x2d/0x40 [ 3520.360637][T22417] do_syscall_64+0x4a/0x90 [ 3520.365048][T22417] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3520.370973][T22417] RIP: 0033:0x4665d9 [ 3520.374860][T22417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 06:27:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c04034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3520.394462][T22417] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3520.402867][T22417] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3520.410832][T22417] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3520.418795][T22417] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3520.426771][T22417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3520.434859][T22417] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034760bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:54 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025", 0x1d}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007500034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:54 executing program 2 (fault-call:3 fault-nth:65): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034768bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3520.514068][T22445] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1068 sclass=netlink_route_socket pid=22445 comm=syz-executor.1 [ 3520.547899][T22456] FAULT_INJECTION: forcing a failure. [ 3520.547899][T22456] name fail_page_alloc, interval 1, probability 0, space 0, times 0 06:27:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c05034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025", 0x1d}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007700034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3520.561197][T22456] CPU: 1 PID: 22456 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3520.571343][T22456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3520.581421][T22456] Call Trace: [ 3520.584689][T22456] dump_stack+0x137/0x19d [ 3520.589015][T22456] should_fail+0x23c/0x250 [ 3520.593428][T22456] __alloc_pages+0x102/0x320 [ 3520.598012][T22456] alloc_pages+0x21d/0x310 [ 3520.602434][T22456] pte_alloc_one+0x29/0xb0 [ 3520.606844][T22456] __pte_alloc+0x2f/0x210 [ 3520.611158][T22456] copy_pte_range+0x128e/0x1460 [ 3520.615997][T22456] ? __alloc_pages+0x194/0x320 [ 3520.620772][T22456] ? vma_interval_tree_augment_rotate+0x100/0x100 [ 3520.627270][T22456] copy_page_range+0x5da/0x8e0 [ 3520.632015][T22456] ? anon_vma_fork+0x273/0x2b0 [ 3520.636754][T22456] dup_mmap+0x6ab/0x9c0 [ 3520.640887][T22456] dup_mm+0x7c/0x210 [ 3520.644760][T22456] copy_process+0x1203/0x2e00 [ 3520.649430][T22456] kernel_clone+0x14b/0x680 [ 3520.653912][T22456] __se_sys_clone3+0x194/0x1d0 [ 3520.658663][T22456] ? __cond_resched+0x11/0x40 [ 3520.663333][T22456] ? perf_trace_sys_exit+0x4d/0x160 [ 3520.668581][T22456] ? fput+0x2d/0x130 [ 3520.672507][T22456] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3520.678565][T22456] ? syscall_trace_enter+0x153/0x290 [ 3520.683852][T22456] ? exit_to_user_mode_prepare+0x65/0x190 [ 3520.689586][T22456] __x64_sys_clone3+0x2d/0x40 [ 3520.694271][T22456] do_syscall_64+0x4a/0x90 [ 3520.698705][T22456] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3520.704596][T22456] RIP: 0033:0x4665d9 [ 3520.708483][T22456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3520.728115][T22456] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3520.736585][T22456] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3520.744661][T22456] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3520.752614][T22456] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:27:54 executing program 2 (fault-call:3 fault-nth:66): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:54 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, r2, 0x0) [ 3520.760575][T22456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3520.768614][T22456] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130003476cbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:54 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, r2, 0x0) 06:27:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17", 0x2b}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3520.841347][T22467] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1324 sclass=netlink_route_socket pid=22467 comm=syz-executor.1 [ 3520.856950][T22470] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=22470 comm=syz-executor.3 [ 3520.880807][T22471] FAULT_INJECTION: forcing a failure. 06:27:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c06034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034774bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3520.880807][T22471] name failslab, interval 1, probability 0, space 0, times 0 [ 3520.893567][T22471] CPU: 1 PID: 22471 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3520.903742][T22471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3520.913790][T22471] Call Trace: [ 3520.917059][T22471] dump_stack+0x137/0x19d [ 3520.921388][T22471] should_fail+0x23c/0x250 [ 3520.925799][T22471] ? dup_mmap+0x38e/0x9c0 [ 3520.930121][T22471] __should_failslab+0x81/0x90 [ 3520.934933][T22471] should_failslab+0x5/0x20 [ 3520.939444][T22471] kmem_cache_alloc+0x46/0x2f0 [ 3520.944267][T22471] ? anon_vma_fork+0x273/0x2b0 [ 3520.949027][T22471] dup_mmap+0x38e/0x9c0 [ 3520.953199][T22471] dup_mm+0x7c/0x210 [ 3520.957135][T22471] copy_process+0x1203/0x2e00 [ 3520.961804][T22471] kernel_clone+0x14b/0x680 [ 3520.966383][T22471] __se_sys_clone3+0x194/0x1d0 [ 3520.971147][T22471] ? __cond_resched+0x11/0x40 [ 3520.975822][T22471] ? perf_trace_sys_exit+0x4d/0x160 [ 3520.981137][T22471] ? fput+0x2d/0x130 [ 3520.985122][T22471] ? fpregs_assert_state_consistent+0x7d/0x90 06:27:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3520.991188][T22471] ? syscall_trace_enter+0x153/0x290 [ 3520.996470][T22471] ? exit_to_user_mode_prepare+0x65/0x190 [ 3521.002416][T22471] __x64_sys_clone3+0x2d/0x40 [ 3521.007121][T22471] do_syscall_64+0x4a/0x90 [ 3521.011543][T22471] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3521.016321][T22487] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1580 sclass=netlink_route_socket pid=22487 comm=syz-executor.1 [ 3521.017506][T22471] RIP: 0033:0x4665d9 06:27:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c07034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3521.017524][T22471] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3521.054038][T22471] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3521.062496][T22471] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3521.070460][T22471] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3521.078424][T22471] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:27:55 executing program 2 (fault-call:3 fault-nth:67): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c08034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3521.086395][T22471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3521.094414][T22471] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130003477abb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:55 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, r2, 0x0) 06:27:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17", 0x2b}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034790bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3521.193209][T22503] FAULT_INJECTION: forcing a failure. [ 3521.193209][T22503] name failslab, interval 1, probability 0, space 0, times 0 [ 3521.205889][T22503] CPU: 0 PID: 22503 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3521.216125][T22503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3521.226195][T22503] Call Trace: [ 3521.229479][T22503] dump_stack+0x137/0x19d [ 3521.233814][T22503] should_fail+0x23c/0x250 [ 3521.238248][T22503] ? dup_mmap+0x38e/0x9c0 06:27:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c09034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3521.242622][T22503] __should_failslab+0x81/0x90 [ 3521.247390][T22503] should_failslab+0x5/0x20 [ 3521.251888][T22503] kmem_cache_alloc+0x46/0x2f0 [ 3521.256651][T22503] dup_mmap+0x38e/0x9c0 [ 3521.260808][T22503] dup_mm+0x7c/0x210 [ 3521.264726][T22503] copy_process+0x1203/0x2e00 [ 3521.269398][T22503] kernel_clone+0x14b/0x680 [ 3521.273905][T22503] __se_sys_clone3+0x194/0x1d0 [ 3521.278663][T22503] ? __cond_resched+0x11/0x40 [ 3521.283381][T22503] ? perf_trace_sys_exit+0x4d/0x160 [ 3521.288642][T22503] ? fput+0x2d/0x130 06:27:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001000034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3521.292547][T22503] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3521.298645][T22503] ? syscall_trace_enter+0x153/0x290 [ 3521.304535][T22503] ? exit_to_user_mode_prepare+0x65/0x190 [ 3521.310254][T22503] __x64_sys_clone3+0x2d/0x40 [ 3521.314930][T22503] do_syscall_64+0x4a/0x90 [ 3521.319377][T22503] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3521.325274][T22503] RIP: 0033:0x4665d9 [ 3521.329180][T22503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3521.348811][T22503] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3521.357217][T22503] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3521.365237][T22503] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3521.373197][T22503] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3521.381161][T22503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 06:27:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c0a034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:55 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, 0xffffffffffffffff, 0x0) [ 3521.389146][T22503] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:55 executing program 2 (fault-call:3 fault-nth:68): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17", 0x2b}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:55 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 06:27:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013000347c0bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001100034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3521.504943][T22543] FAULT_INJECTION: forcing a failure. [ 3521.504943][T22543] name failslab, interval 1, probability 0, space 0, times 0 [ 3521.517639][T22543] CPU: 1 PID: 22543 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3521.527790][T22543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3521.537834][T22543] Call Trace: [ 3521.541145][T22543] dump_stack+0x137/0x19d [ 3521.545573][T22543] should_fail+0x23c/0x250 [ 3521.550126][T22543] ? anon_vma_clone+0x8d/0x380 06:27:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c0b034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013000347e8bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c0c034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff08000400", 0x32}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3521.554967][T22543] __should_failslab+0x81/0x90 [ 3521.559757][T22543] should_failslab+0x5/0x20 [ 3521.564253][T22543] kmem_cache_alloc+0x46/0x2f0 [ 3521.569017][T22543] anon_vma_clone+0x8d/0x380 [ 3521.573609][T22543] anon_vma_fork+0x54/0x2b0 [ 3521.578169][T22543] dup_mmap+0x49c/0x9c0 [ 3521.582343][T22543] dup_mm+0x7c/0x210 [ 3521.586338][T22543] copy_process+0x1203/0x2e00 [ 3521.591019][T22543] kernel_clone+0x14b/0x680 [ 3521.595555][T22543] __se_sys_clone3+0x194/0x1d0 [ 3521.600310][T22543] ? __cond_resched+0x11/0x40 06:27:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c0d034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3521.604988][T22543] ? perf_trace_sys_exit+0x4d/0x160 [ 3521.610192][T22543] ? fput+0x2d/0x130 [ 3521.614090][T22543] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3521.620191][T22543] ? syscall_trace_enter+0x153/0x290 [ 3521.625532][T22543] ? exit_to_user_mode_prepare+0x65/0x190 [ 3521.631283][T22543] __x64_sys_clone3+0x2d/0x40 [ 3521.636014][T22543] do_syscall_64+0x4a/0x90 [ 3521.640484][T22543] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3521.646492][T22543] RIP: 0033:0x4665d9 [ 3521.650387][T22543] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3521.669983][T22543] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3521.678412][T22543] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3521.686400][T22543] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3521.694380][T22543] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:27:55 executing program 2 (fault-call:3 fault-nth:69): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3521.702359][T22543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3521.710352][T22543] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001200034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013000347fdbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3521.797050][T22571] FAULT_INJECTION: forcing a failure. [ 3521.797050][T22571] name failslab, interval 1, probability 0, space 0, times 0 [ 3521.809714][T22571] CPU: 0 PID: 22571 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3521.819880][T22571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3521.829924][T22571] Call Trace: [ 3521.833268][T22571] dump_stack+0x137/0x19d [ 3521.837655][T22571] should_fail+0x23c/0x250 [ 3521.842080][T22571] ? anon_vma_clone+0x8d/0x380 06:27:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff08000400", 0x32}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:55 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 06:27:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c0e034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3521.846892][T22571] __should_failslab+0x81/0x90 [ 3521.851680][T22571] should_failslab+0x5/0x20 [ 3521.856172][T22571] kmem_cache_alloc+0x46/0x2f0 [ 3521.860967][T22571] anon_vma_clone+0x8d/0x380 [ 3521.865653][T22571] anon_vma_fork+0x54/0x2b0 [ 3521.870174][T22571] dup_mmap+0x49c/0x9c0 [ 3521.874327][T22571] dup_mm+0x7c/0x210 [ 3521.878330][T22571] copy_process+0x1203/0x2e00 [ 3521.883028][T22571] kernel_clone+0x14b/0x680 [ 3521.887531][T22571] __se_sys_clone3+0x194/0x1d0 [ 3521.892287][T22571] ? __cond_resched+0x11/0x40 06:27:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c10034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3521.896958][T22571] ? perf_trace_sys_exit+0x4d/0x160 [ 3521.902205][T22571] ? fput+0x2d/0x130 [ 3521.906094][T22571] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3521.912168][T22571] ? syscall_trace_enter+0x153/0x290 [ 3521.917462][T22571] ? exit_to_user_mode_prepare+0x65/0x190 [ 3521.923305][T22571] __x64_sys_clone3+0x2d/0x40 [ 3521.927978][T22571] do_syscall_64+0x4a/0x90 [ 3521.932393][T22571] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3521.938312][T22571] RIP: 0033:0x4665d9 06:27:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c11034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3521.942283][T22571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3521.961917][T22571] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3521.970402][T22571] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3521.978375][T22571] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3521.986336][T22571] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:27:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c12034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 2 (fault-call:3 fault-nth:70): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3521.994304][T22571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3522.002281][T22571] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff08000400", 0x32}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002600034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb0ae1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3522.106774][T22604] __nla_validate_parse: 1 callbacks suppressed [ 3522.106789][T22604] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3522.115455][T22605] FAULT_INJECTION: forcing a failure. [ 3522.115455][T22605] name failslab, interval 1, probability 0, space 0, times 0 [ 3522.134957][T22605] CPU: 1 PID: 22605 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3522.145104][T22605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3522.155153][T22605] Call Trace: [ 3522.158425][T22605] dump_stack+0x137/0x19d [ 3522.162770][T22605] should_fail+0x23c/0x250 [ 3522.167182][T22605] ? anon_vma_clone+0x8d/0x380 [ 3522.171947][T22605] __should_failslab+0x81/0x90 [ 3522.176717][T22605] should_failslab+0x5/0x20 [ 3522.181301][T22605] kmem_cache_alloc+0x46/0x2f0 [ 3522.186086][T22605] anon_vma_clone+0x8d/0x380 [ 3522.190743][T22605] anon_vma_fork+0x54/0x2b0 [ 3522.195244][T22605] dup_mmap+0x49c/0x9c0 [ 3522.199399][T22605] dup_mm+0x7c/0x210 [ 3522.203286][T22605] copy_process+0x1203/0x2e00 [ 3522.207990][T22605] kernel_clone+0x14b/0x680 [ 3522.212514][T22605] __se_sys_clone3+0x194/0x1d0 [ 3522.217420][T22605] ? __cond_resched+0x11/0x40 [ 3522.222093][T22605] ? perf_trace_sys_exit+0x4d/0x160 [ 3522.227284][T22605] ? fput+0x2d/0x130 [ 3522.231177][T22605] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3522.237234][T22605] ? syscall_trace_enter+0x153/0x290 [ 3522.242541][T22605] ? exit_to_user_mode_prepare+0x65/0x190 [ 3522.248287][T22605] __x64_sys_clone3+0x2d/0x40 [ 3522.252999][T22605] do_syscall_64+0x4a/0x90 06:27:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c25034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034709bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c48034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c4c034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c60034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c68034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c6c034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3522.257553][T22605] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3522.263446][T22605] RIP: 0033:0x4665d9 [ 3522.267377][T22605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3522.286998][T22605] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3522.295416][T22605] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 06:27:56 executing program 2 (fault-call:3 fault-nth:71): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c74034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000", 0x36}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001500034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3522.303393][T22605] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3522.311395][T22605] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3522.319355][T22605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3522.327316][T22605] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb25e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034707bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c7a034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001600034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3522.409507][T22640] FAULT_INJECTION: forcing a failure. [ 3522.409507][T22640] name failslab, interval 1, probability 0, space 0, times 0 [ 3522.422143][T22640] CPU: 1 PID: 22640 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3522.432433][T22640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3522.442559][T22640] Call Trace: [ 3522.445837][T22640] dump_stack+0x137/0x19d [ 3522.450180][T22640] should_fail+0x23c/0x250 [ 3522.454590][T22640] ? anon_vma_fork+0xb1/0x2b0 06:27:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00054700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3522.459282][T22640] __should_failslab+0x81/0x90 [ 3522.464088][T22640] should_failslab+0x5/0x20 [ 3522.468629][T22640] kmem_cache_alloc+0x46/0x2f0 [ 3522.473393][T22640] anon_vma_fork+0xb1/0x2b0 [ 3522.477893][T22640] dup_mmap+0x49c/0x9c0 [ 3522.482050][T22640] dup_mm+0x7c/0x210 [ 3522.485938][T22640] copy_process+0x1203/0x2e00 [ 3522.490612][T22640] kernel_clone+0x14b/0x680 [ 3522.492714][T22652] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3522.495113][T22640] __se_sys_clone3+0x194/0x1d0 06:27:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001900034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00064700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3522.495137][T22640] ? __cond_resched+0x11/0x40 [ 3522.513795][T22640] ? perf_trace_sys_exit+0x4d/0x160 [ 3522.519015][T22640] ? fput+0x2d/0x130 [ 3522.522925][T22640] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3522.529028][T22640] ? syscall_trace_enter+0x153/0x290 [ 3522.534307][T22640] ? exit_to_user_mode_prepare+0x65/0x190 [ 3522.540111][T22640] __x64_sys_clone3+0x2d/0x40 [ 3522.544797][T22640] do_syscall_64+0x4a/0x90 [ 3522.549245][T22640] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3522.555304][T22640] RIP: 0033:0x4665d9 [ 3522.559189][T22640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3522.578858][T22640] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3522.587354][T22640] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3522.595326][T22640] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 06:27:56 executing program 2 (fault-call:3 fault-nth:72): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00074700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000", 0x36}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3522.603300][T22640] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3522.611302][T22640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3522.619251][T22640] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034703bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3522.697070][T22671] FAULT_INJECTION: forcing a failure. [ 3522.697070][T22671] name failslab, interval 1, probability 0, space 0, times 0 [ 3522.698527][T22670] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3522.709712][T22671] CPU: 1 PID: 22671 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3522.709732][T22671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3522.709742][T22671] Call Trace: [ 3522.709749][T22671] dump_stack+0x137/0x19d 06:27:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000", 0x36}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00094700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3522.709768][T22671] should_fail+0x23c/0x250 [ 3522.751122][T22671] ? dup_mmap+0x38e/0x9c0 [ 3522.755521][T22671] __should_failslab+0x81/0x90 [ 3522.760307][T22671] should_failslab+0x5/0x20 [ 3522.764790][T22671] kmem_cache_alloc+0x46/0x2f0 [ 3522.769613][T22671] dup_mmap+0x38e/0x9c0 [ 3522.773821][T22671] dup_mm+0x7c/0x210 [ 3522.777708][T22671] copy_process+0x1203/0x2e00 [ 3522.782380][T22671] kernel_clone+0x14b/0x680 [ 3522.786973][T22671] __se_sys_clone3+0x194/0x1d0 [ 3522.791736][T22671] ? __cond_resched+0x11/0x40 [ 3522.796408][T22671] ? perf_trace_sys_exit+0x4d/0x160 [ 3522.801608][T22671] ? fput+0x2d/0x130 [ 3522.805530][T22671] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3522.811641][T22671] ? syscall_trace_enter+0x153/0x290 [ 3522.817137][T22671] ? exit_to_user_mode_prepare+0x65/0x190 [ 3522.822875][T22671] __x64_sys_clone3+0x2d/0x40 [ 3522.827541][T22671] do_syscall_64+0x4a/0x90 [ 3522.832029][T22671] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3522.833802][T22688] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3522.837919][T22671] RIP: 0033:0x4665d9 [ 3522.837936][T22671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3522.870663][T22671] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3522.879109][T22671] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3522.887117][T22671] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 06:27:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c000a4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3522.895098][T22671] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3522.903064][T22671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3522.911027][T22671] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4fffe06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:57 executing program 2 (fault-call:3 fault-nth:73): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff08000400000000000000", 0x38}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:57 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3522.938715][T22687] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.3'. 06:27:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c000b4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001d00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3522.996542][T22699] FAULT_INJECTION: forcing a failure. [ 3522.996542][T22699] name failslab, interval 1, probability 0, space 0, times 0 [ 3523.009223][T22699] CPU: 1 PID: 22699 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3523.019408][T22699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3523.029507][T22699] Call Trace: [ 3523.032790][T22699] dump_stack+0x137/0x19d [ 3523.037129][T22699] should_fail+0x23c/0x250 [ 3523.041555][T22699] ? anon_vma_clone+0x8d/0x380 [ 3523.043969][T22713] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3523.046323][T22699] __should_failslab+0x81/0x90 [ 3523.060338][T22699] should_failslab+0x5/0x20 [ 3523.064833][T22699] kmem_cache_alloc+0x46/0x2f0 [ 3523.069597][T22699] ? avc_has_perm_noaudit+0x19a/0x240 [ 3523.075040][T22699] anon_vma_clone+0x8d/0x380 [ 3523.079725][T22699] anon_vma_fork+0x54/0x2b0 [ 3523.084322][T22699] dup_mmap+0x49c/0x9c0 [ 3523.088495][T22699] dup_mm+0x7c/0x210 [ 3523.092390][T22699] copy_process+0x1203/0x2e00 06:27:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001e00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c000c4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3523.097094][T22699] kernel_clone+0x14b/0x680 [ 3523.101592][T22699] __se_sys_clone3+0x194/0x1d0 [ 3523.106366][T22699] ? __cond_resched+0x11/0x40 [ 3523.111047][T22699] ? perf_trace_sys_exit+0x4d/0x160 [ 3523.116243][T22699] ? fput+0x2d/0x130 [ 3523.120222][T22699] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3523.126373][T22699] ? syscall_trace_enter+0x153/0x290 [ 3523.131646][T22699] ? exit_to_user_mode_prepare+0x65/0x190 [ 3523.137519][T22699] __x64_sys_clone3+0x2d/0x40 [ 3523.138953][T22721] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3523.142220][T22699] do_syscall_64+0x4a/0x90 [ 3523.155923][T22699] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3523.162012][T22699] RIP: 0033:0x4665d9 [ 3523.165917][T22699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3523.185511][T22699] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 06:27:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c000d4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002100034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3523.193912][T22699] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3523.201909][T22699] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3523.209936][T22699] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3523.217898][T22699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3523.225877][T22699] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff08000400000000000000", 0x38}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff02000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3523.239639][T22732] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. 06:27:57 executing program 2 (fault-call:3 fault-nth:74): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r5}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002200034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff08000400000000000000", 0x38}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff03000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c000e4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3523.339828][T22747] FAULT_INJECTION: forcing a failure. [ 3523.339828][T22747] name failslab, interval 1, probability 0, space 0, times 0 [ 3523.352509][T22747] CPU: 0 PID: 22747 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3523.362827][T22747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3523.372918][T22747] Call Trace: [ 3523.376190][T22747] dump_stack+0x137/0x19d [ 3523.380609][T22747] should_fail+0x23c/0x250 [ 3523.385063][T22747] ? dup_mmap+0x38e/0x9c0 [ 3523.389386][T22747] __should_failslab+0x81/0x90 [ 3523.394167][T22747] should_failslab+0x5/0x20 [ 3523.398695][T22747] kmem_cache_alloc+0x46/0x2f0 [ 3523.403655][T22747] ? anon_vma_fork+0x273/0x2b0 [ 3523.408435][T22747] dup_mmap+0x38e/0x9c0 [ 3523.412599][T22747] dup_mm+0x7c/0x210 [ 3523.416492][T22747] copy_process+0x1203/0x2e00 [ 3523.421167][T22747] kernel_clone+0x14b/0x680 [ 3523.425690][T22747] __se_sys_clone3+0x194/0x1d0 [ 3523.430499][T22747] ? __cond_resched+0x11/0x40 06:27:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00114700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3523.435179][T22747] ? perf_trace_sys_exit+0x4d/0x160 [ 3523.440535][T22747] ? fput+0x2d/0x130 [ 3523.444453][T22747] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3523.450538][T22747] ? syscall_trace_enter+0x153/0x290 [ 3523.455818][T22747] ? exit_to_user_mode_prepare+0x65/0x190 [ 3523.461573][T22747] __x64_sys_clone3+0x2d/0x40 [ 3523.466250][T22747] do_syscall_64+0x4a/0x90 [ 3523.470672][T22747] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3523.476571][T22747] RIP: 0033:0x4665d9 [ 3523.480469][T22747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3523.488842][T22762] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3523.500108][T22747] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3523.500132][T22747] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3523.500146][T22747] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 06:27:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00124700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:57 executing program 2 (fault-call:3 fault-nth:75): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3523.534014][T22747] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3523.541993][T22747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3523.549998][T22747] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff05000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3523.601219][T22767] FAULT_INJECTION: forcing a failure. [ 3523.601219][T22767] name failslab, interval 1, probability 0, space 0, times 0 [ 3523.613970][T22767] CPU: 0 PID: 22767 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3523.624111][T22767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3523.634161][T22767] Call Trace: [ 3523.637475][T22767] dump_stack+0x137/0x19d [ 3523.641823][T22767] should_fail+0x23c/0x250 [ 3523.646238][T22767] ? dup_mmap+0x38e/0x9c0 06:27:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = openat(r2, &(0x7f0000000100)='/proc/self/exe\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r5}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00024700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3523.650565][T22767] __should_failslab+0x81/0x90 [ 3523.655452][T22767] should_failslab+0x5/0x20 [ 3523.659983][T22767] kmem_cache_alloc+0x46/0x2f0 [ 3523.664799][T22767] dup_mmap+0x38e/0x9c0 [ 3523.668949][T22767] dup_mm+0x7c/0x210 [ 3523.672833][T22767] copy_process+0x1203/0x2e00 [ 3523.677503][T22767] kernel_clone+0x14b/0x680 [ 3523.682026][T22767] __se_sys_clone3+0x194/0x1d0 [ 3523.686788][T22767] ? __cond_resched+0x11/0x40 [ 3523.691543][T22767] ? perf_trace_sys_exit+0x4d/0x160 [ 3523.696754][T22767] ? fput+0x2d/0x130 06:27:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3523.700733][T22767] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3523.706849][T22767] ? syscall_trace_enter+0x153/0x290 [ 3523.712135][T22767] ? exit_to_user_mode_prepare+0x65/0x190 [ 3523.717886][T22767] __x64_sys_clone3+0x2d/0x40 [ 3523.722686][T22767] do_syscall_64+0x4a/0x90 [ 3523.727103][T22767] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3523.733004][T22767] RIP: 0033:0x4665d9 [ 3523.736900][T22767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3523.756505][T22767] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3523.764990][T22767] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3523.772970][T22767] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3523.780935][T22767] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3523.788962][T22767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 06:27:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00044700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x4000, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:57 executing program 0 (fault-call:8 fault-nth:0): syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3523.796964][T22767] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3523.806923][T22796] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 06:27:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff09000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00054700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:58 executing program 2 (fault-call:3 fault-nth:76): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002500034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3523.890102][T22813] FAULT_INJECTION: forcing a failure. [ 3523.890102][T22813] name failslab, interval 1, probability 0, space 0, times 0 [ 3523.902848][T22813] CPU: 1 PID: 22813 Comm: syz-executor.0 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3523.913026][T22813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3523.923080][T22813] Call Trace: [ 3523.926352][T22813] dump_stack+0x137/0x19d [ 3523.930700][T22813] should_fail+0x23c/0x250 [ 3523.935109][T22813] ? vm_area_dup+0x44/0x120 [ 3523.937770][T22820] FAULT_INJECTION: forcing a failure. [ 3523.937770][T22820] name failslab, interval 1, probability 0, space 0, times 0 [ 3523.939616][T22813] __should_failslab+0x81/0x90 [ 3523.939643][T22813] should_failslab+0x5/0x20 [ 3523.961490][T22813] kmem_cache_alloc+0x46/0x2f0 [ 3523.966247][T22813] vm_area_dup+0x44/0x120 [ 3523.970671][T22813] ? mntput_no_expire+0x64/0x730 [ 3523.975675][T22813] ? mntput+0x45/0x70 [ 3523.979729][T22813] ? terminate_walk+0x261/0x270 [ 3523.984661][T22813] __split_vma+0x82/0x320 [ 3523.989032][T22813] ? vmacache_find+0x1e2/0x320 [ 3523.993834][T22813] __do_munmap+0x2e9/0x1330 [ 3523.998359][T22813] ? avc_has_perm+0x59/0x150 [ 3524.003044][T22813] ? avc_has_perm+0xc8/0x150 [ 3524.007801][T22813] mmap_region+0x58a/0x13e0 [ 3524.012314][T22813] ? security_mmap_addr+0x78/0x90 [ 3524.017328][T22813] do_mmap+0x77d/0xc90 [ 3524.021388][T22813] vm_mmap_pgoff+0xf9/0x1d0 [ 3524.025883][T22813] ksys_mmap_pgoff+0x2a8/0x380 [ 3524.030633][T22813] do_syscall_64+0x4a/0x90 [ 3524.035111][T22813] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3524.041005][T22813] RIP: 0033:0x4665d9 [ 3524.044902][T22813] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3524.064515][T22813] RSP: 002b:00007f6f6f2f0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 3524.072920][T22813] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3524.080964][T22813] RDX: 0000000000000000 RSI: 0000000000600000 RDI: 0000000020000000 [ 3524.088923][T22813] RBP: 00007f6f6f2f01d0 R08: 0000000000000007 R09: 0000000000000000 [ 3524.096910][T22813] R10: 0000000000000012 R11: 0000000000000246 R12: 0000000000000001 [ 3524.104925][T22813] R13: 00007ffd2ee0176f R14: 00007f6f6f2f0300 R15: 0000000000022000 [ 3524.112898][T22820] CPU: 0 PID: 22820 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3524.123075][T22820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3524.133119][T22820] Call Trace: [ 3524.136388][T22820] dump_stack+0x137/0x19d 06:27:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00064700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3524.140712][T22820] should_fail+0x23c/0x250 [ 3524.145137][T22820] ? anon_vma_clone+0x8d/0x380 [ 3524.149965][T22820] __should_failslab+0x81/0x90 [ 3524.154814][T22820] should_failslab+0x5/0x20 [ 3524.159349][T22820] kmem_cache_alloc+0x46/0x2f0 [ 3524.164120][T22820] ? avc_has_perm_noaudit+0x19a/0x240 [ 3524.169493][T22820] anon_vma_clone+0x8d/0x380 [ 3524.174108][T22820] anon_vma_fork+0x54/0x2b0 [ 3524.178604][T22820] dup_mmap+0x49c/0x9c0 [ 3524.182754][T22820] dup_mm+0x7c/0x210 [ 3524.186626][T22820] copy_process+0x1203/0x2e00 [ 3524.191329][T22820] kernel_clone+0x14b/0x680 [ 3524.195827][T22820] __se_sys_clone3+0x194/0x1d0 [ 3524.200625][T22820] ? __cond_resched+0x11/0x40 [ 3524.205363][T22820] ? perf_trace_sys_exit+0x4d/0x160 [ 3524.210578][T22820] ? fput+0x2d/0x130 [ 3524.214464][T22820] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3524.220529][T22820] ? syscall_trace_enter+0x153/0x290 [ 3524.225827][T22820] ? exit_to_user_mode_prepare+0x65/0x190 [ 3524.231664][T22820] __x64_sys_clone3+0x2d/0x40 [ 3524.236332][T22820] do_syscall_64+0x4a/0x90 [ 3524.240763][T22820] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3524.246656][T22820] RIP: 0033:0x4665d9 [ 3524.250615][T22820] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3524.270261][T22820] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3524.278753][T22820] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 06:27:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff1e000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3524.286741][T22820] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3524.294744][T22820] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3524.302699][T22820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3524.310661][T22820] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:27:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002600034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:58 executing program 0 (fault-call:8 fault-nth:1): syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:58 executing program 2 (fault-call:3 fault-nth:77): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3524.416149][T22836] FAULT_INJECTION: forcing a failure. [ 3524.416149][T22836] name failslab, interval 1, probability 0, space 0, times 0 [ 3524.428989][T22836] CPU: 1 PID: 22836 Comm: syz-executor.0 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3524.439136][T22836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3524.449266][T22836] Call Trace: [ 3524.452554][T22836] dump_stack+0x137/0x19d [ 3524.456886][T22836] should_fail+0x23c/0x250 [ 3524.461417][T22836] ? anon_vma_clone+0x8d/0x380 [ 3524.466254][T22836] __should_failslab+0x81/0x90 [ 3524.471021][T22836] should_failslab+0x5/0x20 [ 3524.475586][T22836] kmem_cache_alloc+0x46/0x2f0 [ 3524.480346][T22836] anon_vma_clone+0x8d/0x380 [ 3524.485005][T22836] __split_vma+0x134/0x320 [ 3524.489507][T22836] ? vmacache_find+0x1e2/0x320 [ 3524.494271][T22836] __do_munmap+0x2e9/0x1330 [ 3524.498850][T22836] mmap_region+0x58a/0x13e0 [ 3524.503361][T22836] ? security_mmap_addr+0x78/0x90 [ 3524.504763][T22838] FAULT_INJECTION: forcing a failure. [ 3524.504763][T22838] name failslab, interval 1, probability 0, space 0, times 0 [ 3524.508387][T22836] do_mmap+0x77d/0xc90 [ 3524.508409][T22836] vm_mmap_pgoff+0xf9/0x1d0 [ 3524.529485][T22836] ksys_mmap_pgoff+0x2a8/0x380 [ 3524.534257][T22836] do_syscall_64+0x4a/0x90 [ 3524.538720][T22836] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3524.544610][T22836] RIP: 0033:0x4665d9 06:27:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff81ffffff010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00074700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3524.548505][T22836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3524.568097][T22836] RSP: 002b:00007f6f6f2f0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 3524.576586][T22836] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3524.584625][T22836] RDX: 0000000000000000 RSI: 0000000000600000 RDI: 0000000020000000 [ 3524.592589][T22836] RBP: 00007f6f6f2f01d0 R08: 0000000000000007 R09: 0000000000000000 [ 3524.600548][T22836] R10: 0000000000000012 R11: 0000000000000246 R12: 0000000000000001 [ 3524.608506][T22836] R13: 00007ffd2ee0176f R14: 00007f6f6f2f0300 R15: 0000000000022000 [ 3524.616469][T22838] CPU: 0 PID: 22838 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3524.623810][T22847] validate_nla: 110 callbacks suppressed [ 3524.623822][T22847] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 3524.626620][T22838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3524.626634][T22838] Call Trace: [ 3524.626641][T22838] dump_stack+0x137/0x19d [ 3524.657889][T22838] should_fail+0x23c/0x250 [ 3524.662297][T22838] ? anon_vma_fork+0xb1/0x2b0 06:27:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00084700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3524.666966][T22838] __should_failslab+0x81/0x90 [ 3524.671723][T22838] should_failslab+0x5/0x20 [ 3524.676214][T22838] kmem_cache_alloc+0x46/0x2f0 [ 3524.680972][T22838] anon_vma_fork+0xb1/0x2b0 [ 3524.685466][T22838] dup_mmap+0x49c/0x9c0 [ 3524.689676][T22838] dup_mm+0x7c/0x210 [ 3524.693562][T22838] copy_process+0x1203/0x2e00 [ 3524.698236][T22838] kernel_clone+0x14b/0x680 [ 3524.702783][T22838] __se_sys_clone3+0x194/0x1d0 [ 3524.707550][T22838] ? __cond_resched+0x11/0x40 [ 3524.712219][T22838] ? perf_trace_sys_exit+0x4d/0x160 [ 3524.717439][T22838] ? fput+0x2d/0x130 [ 3524.721314][T22838] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3524.727386][T22838] ? syscall_trace_enter+0x153/0x290 [ 3524.732745][T22838] ? exit_to_user_mode_prepare+0x65/0x190 [ 3524.738567][T22838] __x64_sys_clone3+0x2d/0x40 [ 3524.743285][T22838] do_syscall_64+0x4a/0x90 [ 3524.747819][T22838] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3524.753709][T22838] RIP: 0033:0x4665d9 [ 3524.757594][T22838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3524.777646][T22838] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3524.786172][T22838] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3524.794134][T22838] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3524.802087][T22838] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3524.810082][T22838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 06:27:58 executing program 2 (fault-call:3 fault-nth:78): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3524.818042][T22838] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3524.837279][T22846] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:27:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:59 executing program 0 (fault-call:8 fault-nth:2): syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) [ 3524.867064][T22851] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3524.890701][T22853] netlink: 'syz-executor.5': attribute type 17 has an invalid length. [ 3524.901680][T22858] FAULT_INJECTION: forcing a failure. [ 3524.901680][T22858] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3524.914938][T22858] CPU: 1 PID: 22858 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3524.925111][T22858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3524.935154][T22858] Call Trace: [ 3524.938457][T22858] dump_stack+0x137/0x19d [ 3524.942783][T22858] should_fail+0x23c/0x250 [ 3524.943606][T22846] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3524.947192][T22858] __alloc_pages+0x102/0x320 [ 3524.947215][T22858] alloc_pages+0x21d/0x310 [ 3524.964206][T22858] pte_alloc_one+0x29/0xb0 [ 3524.968614][T22858] __pte_alloc+0x2f/0x210 [ 3524.972941][T22858] copy_pte_range+0x128e/0x1460 [ 3524.977797][T22858] ? __alloc_pages+0x194/0x320 [ 3524.982587][T22858] ? __down_write_common+0x45/0x890 [ 3524.987781][T22858] ? rb_erase+0x623/0x750 [ 3524.992103][T22858] copy_page_range+0x5da/0x8e0 [ 3524.996867][T22858] ? up_write+0x25/0xc0 [ 3525.001013][T22858] dup_mmap+0x6ab/0x9c0 [ 3525.005159][T22858] dup_mm+0x7c/0x210 [ 3525.009040][T22858] copy_process+0x1203/0x2e00 [ 3525.013711][T22858] kernel_clone+0x14b/0x680 06:27:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00094700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c000a4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3525.018209][T22858] __se_sys_clone3+0x194/0x1d0 [ 3525.022967][T22858] ? __cond_resched+0x11/0x40 [ 3525.027656][T22858] ? perf_trace_sys_exit+0x4d/0x160 [ 3525.032905][T22858] ? fput+0x2d/0x130 [ 3525.036796][T22858] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3525.042865][T22858] ? syscall_trace_enter+0x153/0x290 [ 3525.048145][T22858] ? exit_to_user_mode_prepare+0x65/0x190 [ 3525.053880][T22858] __x64_sys_clone3+0x2d/0x40 [ 3525.058549][T22858] do_syscall_64+0x4a/0x90 [ 3525.062971][T22858] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3525.068871][T22858] RIP: 0033:0x4665d9 [ 3525.071267][T22873] FAULT_INJECTION: forcing a failure. [ 3525.071267][T22873] name failslab, interval 1, probability 0, space 0, times 0 [ 3525.072758][T22858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3525.072779][T22858] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3525.072799][T22858] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3525.121252][T22858] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3525.129211][T22858] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3525.137183][T22858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3525.145138][T22858] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3525.153128][T22873] CPU: 0 PID: 22873 Comm: syz-executor.0 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3525.163291][T22873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3525.173425][T22873] Call Trace: [ 3525.176700][T22873] dump_stack+0x137/0x19d [ 3525.181027][T22873] should_fail+0x23c/0x250 [ 3525.185441][T22873] ? vm_area_alloc+0x28/0xa0 [ 3525.190092][T22873] __should_failslab+0x81/0x90 [ 3525.194854][T22873] should_failslab+0x5/0x20 [ 3525.199438][T22873] kmem_cache_alloc+0x46/0x2f0 [ 3525.204200][T22873] vm_area_alloc+0x28/0xa0 [ 3525.208723][T22873] mmap_region+0x721/0x13e0 [ 3525.213306][T22873] ? security_mmap_addr+0x78/0x90 [ 3525.218381][T22873] do_mmap+0x77d/0xc90 [ 3525.222442][T22873] vm_mmap_pgoff+0xf9/0x1d0 [ 3525.226936][T22873] ksys_mmap_pgoff+0x2a8/0x380 [ 3525.231678][T22873] do_syscall_64+0x4a/0x90 [ 3525.236072][T22873] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3525.242046][T22873] RIP: 0033:0x4665d9 [ 3525.245940][T22873] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 06:27:59 executing program 2 (fault-call:3 fault-nth:79): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3525.265550][T22873] RSP: 002b:00007f6f6f2cf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 3525.273967][T22873] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 3525.281941][T22873] RDX: 0000000000000000 RSI: 0000000000600000 RDI: 0000000020000000 [ 3525.289908][T22873] RBP: 00007f6f6f2cf1d0 R08: 0000000000000007 R09: 0000000000000000 [ 3525.297873][T22873] R10: 0000000000000012 R11: 0000000000000246 R12: 0000000000000001 [ 3525.305946][T22873] R13: 00007ffd2ee0176f R14: 00007f6f6f2cf300 R15: 0000000000022000 [ 3525.314892][T22851] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3525.338678][T22887] FAULT_INJECTION: forcing a failure. [ 3525.338678][T22887] name failslab, interval 1, probability 0, space 0, times 0 [ 3525.351326][T22887] CPU: 0 PID: 22887 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3525.361504][T22887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3525.367428][T22876] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 3525.371538][T22887] Call Trace: [ 3525.371547][T22887] dump_stack+0x137/0x19d [ 3525.387202][T22887] should_fail+0x23c/0x250 [ 3525.391612][T22887] ? dup_mmap+0x38e/0x9c0 [ 3525.395932][T22887] __should_failslab+0x81/0x90 [ 3525.400797][T22887] should_failslab+0x5/0x20 [ 3525.405306][T22887] kmem_cache_alloc+0x46/0x2f0 [ 3525.410219][T22887] dup_mmap+0x38e/0x9c0 [ 3525.414420][T22887] dup_mm+0x7c/0x210 06:27:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c000b4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000004000000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:27:59 executing program 0 (fault-call:8 fault-nth:3): syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:27:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002900034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3525.418328][T22887] copy_process+0x1203/0x2e00 [ 3525.423005][T22887] kernel_clone+0x14b/0x680 [ 3525.427498][T22887] __se_sys_clone3+0x194/0x1d0 [ 3525.432306][T22887] ? __cond_resched+0x11/0x40 [ 3525.437017][T22887] ? perf_trace_sys_exit+0x4d/0x160 [ 3525.442216][T22887] ? fput+0x2d/0x130 [ 3525.446166][T22887] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3525.452293][T22887] ? syscall_trace_enter+0x153/0x290 [ 3525.457577][T22887] ? exit_to_user_mode_prepare+0x65/0x190 [ 3525.463293][T22887] __x64_sys_clone3+0x2d/0x40 [ 3525.467959][T22887] do_syscall_64+0x4a/0x90 [ 3525.472372][T22887] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3525.478278][T22887] RIP: 0033:0x4665d9 [ 3525.482175][T22887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3525.501777][T22887] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3525.510187][T22887] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3525.518138][T22887] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3525.526126][T22887] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3525.534123][T22887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3525.542100][T22887] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3525.560101][T22885] netlink: 'syz-executor.5': attribute type 17 has an invalid length. 06:27:59 executing program 2 (fault-call:3 fault-nth:80): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:27:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3525.570466][T22893] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3525.598897][T22896] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3525.609257][T22900] FAULT_INJECTION: forcing a failure. [ 3525.609257][T22900] name failslab, interval 1, probability 0, space 0, times 0 [ 3525.621905][T22900] CPU: 1 PID: 22900 Comm: syz-executor.0 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3525.629086][T22903] FAULT_INJECTION: forcing a failure. [ 3525.629086][T22903] name failslab, interval 1, probability 0, space 0, times 0 [ 3525.632046][T22900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3525.632060][T22900] Call Trace: [ 3525.632068][T22900] dump_stack+0x137/0x19d [ 3525.662215][T22900] should_fail+0x23c/0x250 [ 3525.666641][T22900] __should_failslab+0x81/0x90 [ 3525.671396][T22900] ? perf_event_mmap+0x774/0xd00 [ 3525.676320][T22900] should_failslab+0x5/0x20 [ 3525.680931][T22900] kmem_cache_alloc_trace+0x49/0x310 [ 3525.686235][T22900] perf_event_mmap+0x774/0xd00 [ 3525.690988][T22900] ? ___cache_free+0x3c/0x300 [ 3525.695673][T22900] ? ktime_get_coarse_real_ts64+0x10d/0x120 [ 3525.701565][T22900] ? __down_write_common+0x45/0x890 [ 3525.706864][T22900] ? current_time+0xdb/0x190 [ 3525.711486][T22900] ? __rb_insert_augmented+0x347/0x350 [ 3525.716935][T22900] ? anon_vma_interval_tree_iter_next+0x2a0/0x2a0 [ 3525.723343][T22900] ? __do_sys_brk+0x580/0x580 [ 3525.728014][T22900] ? vma_link+0x188/0x1a0 [ 3525.732329][T22900] mmap_region+0x6bc/0x13e0 [ 3525.736828][T22900] do_mmap+0x77d/0xc90 [ 3525.740884][T22900] vm_mmap_pgoff+0xf9/0x1d0 [ 3525.745378][T22900] ksys_mmap_pgoff+0x2a8/0x380 [ 3525.750145][T22900] do_syscall_64+0x4a/0x90 [ 3525.754812][T22900] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3525.760735][T22900] RIP: 0033:0x4665d9 [ 3525.764644][T22900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3525.784283][T22900] RSP: 002b:00007f6f6f2f0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 3525.792689][T22900] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3525.800647][T22900] RDX: 0000000000000000 RSI: 0000000000600000 RDI: 0000000020000000 [ 3525.808661][T22900] RBP: 00007f6f6f2f01d0 R08: 0000000000000007 R09: 0000000000000000 06:27:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c000c4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3525.816617][T22900] R10: 0000000000000012 R11: 0000000000000246 R12: 0000000000000001 [ 3525.824579][T22900] R13: 00007ffd2ee0176f R14: 00007f6f6f2f0300 R15: 0000000000022000 [ 3525.832546][T22903] CPU: 0 PID: 22903 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3525.842720][T22903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3525.852951][T22903] Call Trace: [ 3525.856221][T22903] dump_stack+0x137/0x19d [ 3525.860546][T22903] should_fail+0x23c/0x250 [ 3525.864941][T22903] ? anon_vma_clone+0x8d/0x380 06:28:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3525.869740][T22903] __should_failslab+0x81/0x90 [ 3525.874530][T22903] should_failslab+0x5/0x20 [ 3525.879060][T22903] kmem_cache_alloc+0x46/0x2f0 [ 3525.883866][T22903] ? avc_has_perm_noaudit+0x19a/0x240 [ 3525.889350][T22903] anon_vma_clone+0x8d/0x380 [ 3525.893934][T22903] anon_vma_fork+0x54/0x2b0 [ 3525.898537][T22903] dup_mmap+0x49c/0x9c0 [ 3525.902714][T22903] dup_mm+0x7c/0x210 [ 3525.906605][T22903] copy_process+0x1203/0x2e00 [ 3525.911318][T22903] kernel_clone+0x14b/0x680 [ 3525.915879][T22903] __se_sys_clone3+0x194/0x1d0 06:28:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06020000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3525.920711][T22903] ? __cond_resched+0x11/0x40 [ 3525.925380][T22903] ? perf_trace_sys_exit+0x4d/0x160 [ 3525.930595][T22903] ? fput+0x2d/0x130 [ 3525.934552][T22903] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3525.940620][T22903] ? syscall_trace_enter+0x153/0x290 [ 3525.945919][T22903] ? exit_to_user_mode_prepare+0x65/0x190 [ 3525.951634][T22903] __x64_sys_clone3+0x2d/0x40 [ 3525.956312][T22903] do_syscall_64+0x4a/0x90 [ 3525.960789][T22903] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3525.966661][T22903] RIP: 0033:0x4665d9 [ 3525.970563][T22903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3525.990159][T22903] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3525.998547][T22903] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3526.006529][T22903] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3526.014495][T22903] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:28:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002b00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c000d4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:00 executing program 2 (fault-call:3 fault-nth:81): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3526.022471][T22903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3526.030439][T22903] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:28:00 executing program 0 (fault-call:8 fault-nth:4): syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:28:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x0, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3526.081985][T22917] selinux_netlink_send: 21 callbacks suppressed [ 3526.081997][T22917] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pid=22917 comm=syz-executor.3 [ 3526.123323][T22922] FAULT_INJECTION: forcing a failure. [ 3526.123323][T22922] name failslab, interval 1, probability 0, space 0, times 0 [ 3526.135946][T22922] CPU: 0 PID: 22922 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3526.146148][T22922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3526.156198][T22922] Call Trace: [ 3526.159466][T22922] dump_stack+0x137/0x19d [ 3526.163795][T22922] should_fail+0x23c/0x250 [ 3526.168279][T22922] ? anon_vma_fork+0xb1/0x2b0 06:28:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c000e4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3526.173010][T22922] __should_failslab+0x81/0x90 [ 3526.177794][T22922] should_failslab+0x5/0x20 [ 3526.182287][T22922] kmem_cache_alloc+0x46/0x2f0 [ 3526.187057][T22922] anon_vma_fork+0xb1/0x2b0 [ 3526.191555][T22922] dup_mmap+0x49c/0x9c0 [ 3526.195716][T22922] dup_mm+0x7c/0x210 [ 3526.199603][T22922] copy_process+0x1203/0x2e00 [ 3526.204283][T22922] kernel_clone+0x14b/0x680 [ 3526.208791][T22922] __se_sys_clone3+0x194/0x1d0 [ 3526.213564][T22922] ? __cond_resched+0x11/0x40 [ 3526.218316][T22922] ? perf_trace_sys_exit+0x4d/0x160 06:28:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3526.223528][T22922] ? fput+0x2d/0x130 [ 3526.227461][T22922] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3526.233550][T22922] ? syscall_trace_enter+0x153/0x290 [ 3526.238848][T22922] ? exit_to_user_mode_prepare+0x65/0x190 [ 3526.244617][T22922] __x64_sys_clone3+0x2d/0x40 [ 3526.249305][T22922] do_syscall_64+0x4a/0x90 [ 3526.253782][T22922] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3526.259673][T22922] RIP: 0033:0x4665d9 [ 3526.263553][T22922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3526.283332][T22922] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3526.291727][T22922] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3526.293891][T22929] FAULT_INJECTION: forcing a failure. [ 3526.293891][T22929] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3526.299710][T22922] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3526.299728][T22922] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3526.328628][T22922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3526.336591][T22922] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3526.344560][T22929] CPU: 1 PID: 22929 Comm: syz-executor.0 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3526.354968][T22929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3526.365011][T22929] Call Trace: [ 3526.368280][T22929] dump_stack+0x137/0x19d [ 3526.372655][T22929] should_fail+0x23c/0x250 [ 3526.377068][T22929] should_fail_usercopy+0x16/0x20 [ 3526.382087][T22929] _copy_to_user+0x1c/0x90 [ 3526.386562][T22929] simple_read_from_buffer+0xab/0x120 [ 3526.391927][T22929] proc_fail_nth_read+0xf6/0x140 [ 3526.396932][T22929] ? rw_verify_area+0x136/0x250 [ 3526.401781][T22929] ? proc_fault_inject_write+0x200/0x200 [ 3526.407428][T22929] vfs_read+0x154/0x5d0 [ 3526.411573][T22929] ? up_write+0x25/0xc0 [ 3526.415734][T22929] ? __fget_light+0x21b/0x260 [ 3526.420404][T22929] ? __cond_resched+0x11/0x40 [ 3526.425093][T22929] ksys_read+0xce/0x180 [ 3526.429288][T22929] __x64_sys_read+0x3e/0x50 [ 3526.433776][T22929] do_syscall_64+0x4a/0x90 [ 3526.438188][T22929] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3526.444097][T22929] RIP: 0033:0x41935c [ 3526.447990][T22929] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 06:28:00 executing program 2 (fault-call:3 fault-nth:82): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002d00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00104700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3526.467691][T22929] RSP: 002b:00007f6f6f2cf170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3526.476181][T22929] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 000000000041935c [ 3526.484185][T22929] RDX: 000000000000000f RSI: 00007f6f6f2cf1e0 RDI: 0000000000000008 [ 3526.492149][T22929] RBP: 00007f6f6f2cf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3526.500227][T22929] R10: 0000000000000012 R11: 0000000000000246 R12: 0000000000000001 [ 3526.508207][T22929] R13: 00007ffd2ee0176f R14: 00007f6f6f2cf300 R15: 0000000000022000 [ 3526.530964][T22942] FAULT_INJECTION: forcing a failure. [ 3526.530964][T22942] name failslab, interval 1, probability 0, space 0, times 0 [ 3526.543598][T22942] CPU: 0 PID: 22942 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3526.553812][T22942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3526.563966][T22942] Call Trace: [ 3526.567240][T22942] dump_stack+0x137/0x19d [ 3526.571564][T22942] should_fail+0x23c/0x250 [ 3526.576026][T22942] ? anon_vma_fork+0x117/0x2b0 06:28:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002e00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06030000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00114700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00124700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3526.580807][T22942] __should_failslab+0x81/0x90 [ 3526.585667][T22942] should_failslab+0x5/0x20 [ 3526.590162][T22942] kmem_cache_alloc+0x46/0x2f0 [ 3526.594986][T22942] ? anon_vma_fork+0xb1/0x2b0 [ 3526.599721][T22942] anon_vma_fork+0x117/0x2b0 [ 3526.604308][T22942] dup_mmap+0x49c/0x9c0 [ 3526.608471][T22942] dup_mm+0x7c/0x210 [ 3526.612351][T22942] copy_process+0x1203/0x2e00 [ 3526.617028][T22942] kernel_clone+0x14b/0x680 [ 3526.621606][T22942] __se_sys_clone3+0x194/0x1d0 [ 3526.626429][T22942] ? __cond_resched+0x11/0x40 [ 3526.631140][T22942] ? perf_trace_sys_exit+0x4d/0x160 [ 3526.636347][T22942] ? fput+0x2d/0x130 [ 3526.640257][T22942] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3526.646372][T22942] ? syscall_trace_enter+0x153/0x290 [ 3526.651684][T22942] ? exit_to_user_mode_prepare+0x65/0x190 [ 3526.657428][T22942] __x64_sys_clone3+0x2d/0x40 [ 3526.662161][T22942] do_syscall_64+0x4a/0x90 [ 3526.666578][T22942] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3526.672491][T22942] RIP: 0033:0x4665d9 [ 3526.676374][T22942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3526.696078][T22942] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3526.704550][T22942] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3526.712589][T22942] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3526.720609][T22942] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:28:00 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) 06:28:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000003000034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3526.728573][T22942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3526.736567][T22942] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:28:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x0, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:00 executing program 2 (fault-call:3 fault-nth:83): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06040000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00033500bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:00 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x0, 0x12, r2, 0x0) 06:28:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06050000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:01 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0, 0x12, r2, 0x0) 06:28:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034702bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034703bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3526.878033][T22971] FAULT_INJECTION: forcing a failure. [ 3526.878033][T22971] name failslab, interval 1, probability 0, space 0, times 0 [ 3526.890709][T22971] CPU: 0 PID: 22971 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3526.900908][T22971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3526.911006][T22971] Call Trace: [ 3526.914312][T22971] dump_stack+0x137/0x19d [ 3526.918639][T22971] should_fail+0x23c/0x250 [ 3526.923095][T22971] ? anon_vma_fork+0x117/0x2b0 06:28:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034704bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034705bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3526.927861][T22971] __should_failslab+0x81/0x90 [ 3526.932708][T22971] should_failslab+0x5/0x20 [ 3526.937222][T22971] kmem_cache_alloc+0x46/0x2f0 [ 3526.942046][T22971] ? anon_vma_fork+0xb1/0x2b0 [ 3526.946765][T22971] anon_vma_fork+0x117/0x2b0 [ 3526.951397][T22971] dup_mmap+0x49c/0x9c0 [ 3526.955547][T22971] dup_mm+0x7c/0x210 [ 3526.959504][T22971] copy_process+0x1203/0x2e00 [ 3526.964177][T22971] kernel_clone+0x14b/0x680 [ 3526.968696][T22971] __se_sys_clone3+0x194/0x1d0 [ 3526.973492][T22971] ? __cond_resched+0x11/0x40 06:28:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000003100034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034706bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3526.978160][T22971] ? perf_trace_sys_exit+0x4d/0x160 [ 3526.983401][T22971] ? fput+0x2d/0x130 [ 3526.987293][T22971] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3526.993362][T22971] ? syscall_trace_enter+0x153/0x290 [ 3526.998655][T22971] ? exit_to_user_mode_prepare+0x65/0x190 [ 3527.004392][T22971] __x64_sys_clone3+0x2d/0x40 [ 3527.009077][T22971] do_syscall_64+0x4a/0x90 [ 3527.013507][T22971] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3527.019420][T22971] RIP: 0033:0x4665d9 [ 3527.023333][T22971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3527.042926][T22971] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3527.051576][T22971] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3527.059599][T22971] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3527.067546][T22971] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:28:01 executing program 2 (fault-call:3 fault-nth:84): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x0, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034707bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000003200034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3527.075551][T22971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3527.083529][T22971] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:28:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06060000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3527.135632][T23001] __nla_validate_parse: 20 callbacks suppressed [ 3527.135712][T23001] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3527.154888][T23003] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3527.164221][T23003] tc_dump_action: action bad kind [ 3527.179401][T23004] FAULT_INJECTION: forcing a failure. [ 3527.179401][T23004] name failslab, interval 1, probability 0, space 0, times 0 [ 3527.192014][T23004] CPU: 1 PID: 23004 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3527.202272][T23004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3527.212443][T23004] Call Trace: [ 3527.215706][T23004] dump_stack+0x137/0x19d [ 3527.220078][T23004] should_fail+0x23c/0x250 [ 3527.224505][T23004] ? dup_mmap+0x38e/0x9c0 [ 3527.228886][T23004] __should_failslab+0x81/0x90 [ 3527.233705][T23004] should_failslab+0x5/0x20 [ 3527.238397][T23004] kmem_cache_alloc+0x46/0x2f0 [ 3527.243158][T23004] ? anon_vma_fork+0x273/0x2b0 [ 3527.247964][T23004] dup_mmap+0x38e/0x9c0 [ 3527.252118][T23004] dup_mm+0x7c/0x210 [ 3527.256007][T23004] copy_process+0x1203/0x2e00 [ 3527.260684][T23004] kernel_clone+0x14b/0x680 [ 3527.265188][T23004] __se_sys_clone3+0x194/0x1d0 [ 3527.269994][T23004] ? __cond_resched+0x11/0x40 [ 3527.274832][T23004] ? perf_trace_sys_exit+0x4d/0x160 [ 3527.280034][T23004] ? fput+0x2d/0x130 [ 3527.284004][T23004] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3527.290068][T23004] ? syscall_trace_enter+0x153/0x290 [ 3527.295422][T23004] ? exit_to_user_mode_prepare+0x65/0x190 [ 3527.301158][T23004] __x64_sys_clone3+0x2d/0x40 [ 3527.305831][T23004] do_syscall_64+0x4a/0x90 [ 3527.310311][T23004] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3527.316304][T23004] RIP: 0033:0x4665d9 [ 3527.320176][T23004] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3527.339763][T23004] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3527.348168][T23004] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3527.356125][T23004] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3527.364098][T23004] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3527.372049][T23004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 06:28:01 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600004, 0x0, 0x12, r2, 0x0) 06:28:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034708bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06070000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000003400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3527.380032][T23004] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:28:01 executing program 2 (fault-call:3 fault-nth:85): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3527.440940][T23021] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3527.484957][T23030] FAULT_INJECTION: forcing a failure. [ 3527.484957][T23030] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3527.498215][T23030] CPU: 1 PID: 23030 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3527.508392][T23030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3527.518522][T23030] Call Trace: [ 3527.521810][T23030] dump_stack+0x137/0x19d [ 3527.526147][T23030] should_fail+0x23c/0x250 [ 3527.530277][T23035] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3527.530565][T23030] __alloc_pages+0x102/0x320 [ 3527.544513][T23030] alloc_pages+0x21d/0x310 [ 3527.548930][T23030] pte_alloc_one+0x29/0xb0 [ 3527.553339][T23030] __pte_alloc+0x2f/0x210 [ 3527.557663][T23030] copy_pte_range+0x128e/0x1460 [ 3527.562519][T23030] ? __alloc_pages+0x194/0x320 [ 3527.567274][T23030] copy_page_range+0x5da/0x8e0 [ 3527.570992][T23038] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3527.572044][T23030] ? anon_vma_fork+0x273/0x2b0 [ 3527.572068][T23030] dup_mmap+0x6ab/0x9c0 [ 3527.572085][T23030] dup_mm+0x7c/0x210 [ 3527.572099][T23030] copy_process+0x1203/0x2e00 [ 3527.572115][T23030] kernel_clone+0x14b/0x680 [ 3527.572129][T23030] __se_sys_clone3+0x194/0x1d0 [ 3527.607981][T23030] ? __cond_resched+0x11/0x40 [ 3527.611769][T23043] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3527.612653][T23030] ? perf_trace_sys_exit+0x4d/0x160 [ 3527.612690][T23030] ? fput+0x2d/0x130 [ 3527.630978][T23030] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3527.637053][T23030] ? syscall_trace_enter+0x153/0x290 [ 3527.642362][T23030] ? exit_to_user_mode_prepare+0x65/0x190 [ 3527.648080][T23030] __x64_sys_clone3+0x2d/0x40 [ 3527.649515][T23046] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3527.652763][T23030] do_syscall_64+0x4a/0x90 [ 3527.652790][T23030] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3527.672309][T23030] RIP: 0033:0x4665d9 [ 3527.676205][T23030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3527.695805][T23030] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3527.704300][T23030] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3527.712271][T23030] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3527.720235][T23030] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3527.728212][T23030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 06:28:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06080000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034709bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c0003470abb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c0003470bbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c0003470cbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:01 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600005, 0x0, 0x12, r2, 0x0) 06:28:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c0003470dbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000003a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06090000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000003e00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3527.736172][T23030] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:28:01 executing program 2 (fault-call:3 fault-nth:86): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c0003470ebb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3527.797214][T23053] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3527.851147][T23067] FAULT_INJECTION: forcing a failure. [ 3527.851147][T23067] name failslab, interval 1, probability 0, space 0, times 0 [ 3527.863852][T23067] CPU: 0 PID: 23067 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3527.874040][T23067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3527.884082][T23067] Call Trace: [ 3527.887373][T23067] dump_stack+0x137/0x19d [ 3527.888263][T23070] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. 06:28:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000004200034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060a0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:02 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x60000a, 0x0, 0x12, r2, 0x0) 06:28:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034710bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3527.891706][T23067] should_fail+0x23c/0x250 [ 3527.905500][T23067] ? dup_mmap+0x38e/0x9c0 [ 3527.909919][T23067] __should_failslab+0x81/0x90 [ 3527.914676][T23067] should_failslab+0x5/0x20 [ 3527.919202][T23067] kmem_cache_alloc+0x46/0x2f0 [ 3527.923961][T23067] ? anon_vma_fork+0x273/0x2b0 [ 3527.928727][T23067] dup_mmap+0x38e/0x9c0 [ 3527.932877][T23067] dup_mm+0x7c/0x210 [ 3527.936766][T23067] copy_process+0x1203/0x2e00 [ 3527.941492][T23067] kernel_clone+0x14b/0x680 [ 3527.946001][T23067] __se_sys_clone3+0x194/0x1d0 [ 3527.950802][T23067] ? __cond_resched+0x11/0x40 [ 3527.955514][T23067] ? perf_trace_sys_exit+0x4d/0x160 [ 3527.958020][T23076] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3527.960726][T23067] ? fput+0x2d/0x130 [ 3527.960747][T23067] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3527.979963][T23067] ? syscall_trace_enter+0x153/0x290 [ 3527.985306][T23067] ? exit_to_user_mode_prepare+0x65/0x190 [ 3527.991035][T23067] __x64_sys_clone3+0x2d/0x40 [ 3527.995707][T23067] do_syscall_64+0x4a/0x90 06:28:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034711bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3528.000150][T23067] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3528.006042][T23067] RIP: 0033:0x4665d9 [ 3528.009933][T23067] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3528.029713][T23067] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3528.038145][T23067] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 06:28:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034712bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:02 executing program 2 (fault-call:3 fault-nth:87): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060b0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000004300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3528.046111][T23067] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3528.054077][T23067] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3528.062076][T23067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3528.070061][T23067] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:28:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3528.139693][T23090] FAULT_INJECTION: forcing a failure. [ 3528.139693][T23090] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3528.153068][T23090] CPU: 0 PID: 23090 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3528.163241][T23090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3528.173289][T23090] Call Trace: [ 3528.176555][T23090] dump_stack+0x137/0x19d [ 3528.180922][T23090] should_fail+0x23c/0x250 [ 3528.185334][T23090] __alloc_pages+0x102/0x320 06:28:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034725bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:02 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x60000c, 0x0, 0x12, r2, 0x0) [ 3528.189926][T23090] alloc_pages+0x21d/0x310 [ 3528.194498][T23090] pte_alloc_one+0x29/0xb0 [ 3528.198967][T23090] __pte_alloc+0x2f/0x210 [ 3528.203302][T23090] copy_pte_range+0x128e/0x1460 [ 3528.208155][T23090] ? __alloc_pages+0x194/0x320 [ 3528.212930][T23090] copy_page_range+0x5da/0x8e0 [ 3528.217714][T23090] ? __vma_link_rb+0x3c2/0x3e0 [ 3528.222484][T23090] ? up_write+0x25/0xc0 [ 3528.226636][T23090] dup_mmap+0x6ab/0x9c0 [ 3528.230784][T23090] dup_mm+0x7c/0x210 [ 3528.234688][T23090] copy_process+0x1203/0x2e00 06:28:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000004800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3528.239372][T23090] kernel_clone+0x14b/0x680 [ 3528.243919][T23090] __se_sys_clone3+0x194/0x1d0 [ 3528.248844][T23090] ? __cond_resched+0x11/0x40 [ 3528.253527][T23090] ? perf_trace_sys_exit+0x4d/0x160 [ 3528.258722][T23090] ? fput+0x2d/0x130 [ 3528.262612][T23090] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3528.268710][T23090] ? syscall_trace_enter+0x153/0x290 [ 3528.274067][T23090] ? exit_to_user_mode_prepare+0x65/0x190 [ 3528.279851][T23090] __x64_sys_clone3+0x2d/0x40 [ 3528.284576][T23090] do_syscall_64+0x4a/0x90 06:28:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034748bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3528.288995][T23090] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3528.294973][T23090] RIP: 0033:0x4665d9 [ 3528.298858][T23090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3528.318467][T23090] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3528.326912][T23090] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 06:28:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000004900034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c0003474cbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060c0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000004a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3528.334915][T23090] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3528.342895][T23090] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3528.350860][T23090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3528.358943][T23090] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:28:02 executing program 2 (fault-call:3 fault-nth:88): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:02 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x60000f, 0x0, 0x12, r2, 0x0) 06:28:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034760bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034768bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000004c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060d0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3528.527984][T23138] FAULT_INJECTION: forcing a failure. [ 3528.527984][T23138] name failslab, interval 1, probability 0, space 0, times 0 [ 3528.529891][T23143] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=76 sclass=netlink_route_socket pid=23143 comm=syz-executor.3 [ 3528.540690][T23138] CPU: 0 PID: 23138 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3528.563648][T23138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3528.573692][T23138] Call Trace: 06:28:02 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600010, 0x0, 0x12, r2, 0x0) 06:28:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000004e00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3528.576962][T23138] dump_stack+0x137/0x19d [ 3528.581319][T23138] should_fail+0x23c/0x250 [ 3528.585761][T23138] ? dup_mmap+0x38e/0x9c0 [ 3528.590081][T23138] __should_failslab+0x81/0x90 [ 3528.594846][T23138] should_failslab+0x5/0x20 [ 3528.599367][T23138] kmem_cache_alloc+0x46/0x2f0 [ 3528.604178][T23138] ? __vma_link_rb+0x3c2/0x3e0 [ 3528.608934][T23138] ? up_write+0x25/0xc0 [ 3528.613115][T23138] dup_mmap+0x38e/0x9c0 [ 3528.617263][T23138] dup_mm+0x7c/0x210 [ 3528.621148][T23138] copy_process+0x1203/0x2e00 06:28:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000004f00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3528.625833][T23138] kernel_clone+0x14b/0x680 [ 3528.630443][T23138] __se_sys_clone3+0x194/0x1d0 [ 3528.635284][T23138] ? __cond_resched+0x11/0x40 [ 3528.639990][T23138] ? perf_trace_sys_exit+0x4d/0x160 [ 3528.645216][T23138] ? fput+0x2d/0x130 [ 3528.649174][T23138] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3528.655267][T23138] ? syscall_trace_enter+0x153/0x290 [ 3528.660544][T23138] ? exit_to_user_mode_prepare+0x65/0x190 [ 3528.666272][T23138] __x64_sys_clone3+0x2d/0x40 [ 3528.670953][T23138] do_syscall_64+0x4a/0x90 06:28:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c0003476cbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3528.675376][T23138] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3528.681283][T23138] RIP: 0033:0x4665d9 [ 3528.685169][T23138] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3528.704771][T23138] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3528.713176][T23138] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 06:28:02 executing program 2 (fault-call:3 fault-nth:89): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034774bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3528.721150][T23138] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3528.729178][T23138] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3528.737152][T23138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3528.745129][T23138] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:28:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005000034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060e0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:02 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x6000c0, 0x0, 0x12, r2, 0x0) 06:28:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c0003477abb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb0ae1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3528.842113][T23166] FAULT_INJECTION: forcing a failure. [ 3528.842113][T23166] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3528.855512][T23166] CPU: 0 PID: 23166 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3528.865748][T23166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3528.875791][T23166] Call Trace: [ 3528.879058][T23166] dump_stack+0x137/0x19d [ 3528.883492][T23166] should_fail+0x23c/0x250 [ 3528.887910][T23166] __alloc_pages+0x102/0x320 06:28:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005100034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3528.892494][T23166] alloc_pages+0x21d/0x310 [ 3528.897009][T23166] pte_alloc_one+0x29/0xb0 [ 3528.901420][T23166] __pte_alloc+0x2f/0x210 [ 3528.905797][T23166] copy_pte_range+0x128e/0x1460 [ 3528.910682][T23166] ? __alloc_pages+0x194/0x320 [ 3528.915506][T23166] copy_page_range+0x5da/0x8e0 [ 3528.920294][T23166] ? __vma_link_rb+0x3c2/0x3e0 [ 3528.925061][T23166] ? up_write+0x25/0xc0 [ 3528.929210][T23166] dup_mmap+0x6ab/0x9c0 [ 3528.933367][T23166] dup_mm+0x7c/0x210 [ 3528.937256][T23166] copy_process+0x1203/0x2e00 06:28:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005200034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3528.941965][T23166] kernel_clone+0x14b/0x680 [ 3528.946459][T23166] __se_sys_clone3+0x194/0x1d0 [ 3528.951314][T23166] ? __cond_resched+0x11/0x40 [ 3528.955998][T23166] ? perf_trace_sys_exit+0x4d/0x160 [ 3528.961203][T23166] ? fput+0x2d/0x130 [ 3528.965115][T23166] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3528.971196][T23166] ? syscall_trace_enter+0x153/0x290 [ 3528.976542][T23166] ? exit_to_user_mode_prepare+0x65/0x190 [ 3528.982429][T23166] __x64_sys_clone3+0x2d/0x40 [ 3528.987131][T23166] do_syscall_64+0x4a/0x90 06:28:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb25e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3528.991551][T23166] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3528.997569][T23166] RIP: 0033:0x4665d9 [ 3529.001453][T23166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3529.021052][T23166] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3529.029459][T23166] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 06:28:03 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x6000ef, 0x0, 0x12, r2, 0x0) [ 3529.037422][T23166] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3529.045410][T23166] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3529.053389][T23166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3529.061437][T23166] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:28:03 executing program 2 (fault-call:3 fault-nth:90): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06100000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3529.159407][T23200] FAULT_INJECTION: forcing a failure. [ 3529.159407][T23200] name failslab, interval 1, probability 0, space 0, times 0 [ 3529.172104][T23200] CPU: 1 PID: 23200 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3529.182279][T23200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3529.192412][T23200] Call Trace: [ 3529.195682][T23200] dump_stack+0x137/0x19d [ 3529.200187][T23200] should_fail+0x23c/0x250 [ 3529.204603][T23200] ? anon_vma_fork+0x117/0x2b0 06:28:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005500034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff05000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:03 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600209, 0x0, 0x12, r2, 0x0) [ 3529.209405][T23200] __should_failslab+0x81/0x90 [ 3529.214191][T23200] should_failslab+0x5/0x20 [ 3529.218716][T23200] kmem_cache_alloc+0x46/0x2f0 [ 3529.223480][T23200] ? anon_vma_fork+0xb1/0x2b0 [ 3529.228167][T23200] anon_vma_fork+0x117/0x2b0 [ 3529.232836][T23200] dup_mmap+0x49c/0x9c0 [ 3529.237021][T23200] dup_mm+0x7c/0x210 [ 3529.240910][T23200] copy_process+0x1203/0x2e00 [ 3529.245594][T23200] kernel_clone+0x14b/0x680 [ 3529.250182][T23200] __se_sys_clone3+0x194/0x1d0 [ 3529.254944][T23200] ? __cond_resched+0x11/0x40 06:28:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff09000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3529.259612][T23200] ? perf_trace_sys_exit+0x4d/0x160 [ 3529.264806][T23200] ? fput+0x2d/0x130 [ 3529.268744][T23200] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3529.274811][T23200] ? syscall_trace_enter+0x153/0x290 [ 3529.280181][T23200] ? exit_to_user_mode_prepare+0x65/0x190 [ 3529.285911][T23200] __x64_sys_clone3+0x2d/0x40 [ 3529.290592][T23200] do_syscall_64+0x4a/0x90 [ 3529.295015][T23200] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3529.300983][T23200] RIP: 0033:0x4665d9 06:28:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005600034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3529.304885][T23200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3529.324559][T23200] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3529.332998][T23200] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3529.341090][T23200] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3529.349058][T23200] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:28:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff81ffffff010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3529.357042][T23200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3529.365024][T23200] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:28:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06110000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:03 executing program 2 (fault-call:3 fault-nth:91): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:03 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600300, 0x0, 0x12, r2, 0x0) 06:28:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005900034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3529.468236][T23231] FAULT_INJECTION: forcing a failure. [ 3529.468236][T23231] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3529.481665][T23231] CPU: 0 PID: 23231 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3529.491820][T23231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3529.501969][T23231] Call Trace: [ 3529.505402][T23231] dump_stack+0x137/0x19d [ 3529.509744][T23231] should_fail+0x23c/0x250 [ 3529.514168][T23231] __alloc_pages+0x102/0x320 06:28:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000004000000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06120000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3529.518755][T23231] alloc_pages+0x21d/0x310 [ 3529.523185][T23231] pte_alloc_one+0x29/0xb0 [ 3529.527647][T23231] ? kcsan_setup_watchpoint+0x231/0x3e0 [ 3529.533213][T23231] __pte_alloc+0x2f/0x210 [ 3529.537545][T23231] copy_pte_range+0x128e/0x1460 [ 3529.542476][T23231] ? __alloc_pages+0x194/0x320 [ 3529.547247][T23231] copy_page_range+0x5da/0x8e0 [ 3529.552012][T23231] ? __vma_link_rb+0x3c2/0x3e0 [ 3529.556783][T23231] ? up_write+0x25/0xc0 [ 3529.560933][T23231] dup_mmap+0x6ab/0x9c0 [ 3529.565096][T23231] dup_mm+0x7c/0x210 [ 3529.568988][T23231] copy_process+0x1203/0x2e00 [ 3529.573658][T23231] kernel_clone+0x14b/0x680 [ 3529.578155][T23231] __se_sys_clone3+0x194/0x1d0 [ 3529.582914][T23231] ? finish_task_switch+0xce/0x290 [ 3529.588057][T23231] ? __schedule+0x427/0x5b0 [ 3529.592624][T23231] ? __fpregs_load_activate+0x103/0x1b0 [ 3529.598168][T23231] ? syscall_trace_enter+0x153/0x290 [ 3529.603452][T23231] __x64_sys_clone3+0x2d/0x40 [ 3529.608122][T23231] do_syscall_64+0x4a/0x90 [ 3529.612563][T23231] ? irqentry_exit_to_user_mode+0x5/0x20 06:28:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3529.618198][T23231] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3529.624089][T23231] RIP: 0033:0x4665d9 [ 3529.627993][T23231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3529.647597][T23231] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3529.656193][T23231] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 06:28:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06020000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06030000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3529.664179][T23231] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3529.672148][T23231] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3529.680113][T23231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3529.688076][T23231] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3529.712631][T23240] validate_nla: 86 callbacks suppressed 06:28:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3529.712641][T23240] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3529.735470][T23243] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3529.758283][T23244] netlink: 'syz-executor.5': attribute type 17 has an invalid length. 06:28:03 executing program 2 (fault-call:3 fault-nth:92): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06040000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:03 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600500, 0x0, 0x12, r2, 0x0) [ 3529.771216][T23240] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3529.790685][T23243] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3529.813787][T23259] FAULT_INJECTION: forcing a failure. 06:28:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06160000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3529.813787][T23259] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3529.827018][T23259] CPU: 0 PID: 23259 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3529.837162][T23259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3529.847208][T23259] Call Trace: [ 3529.850477][T23259] dump_stack+0x137/0x19d [ 3529.854803][T23259] should_fail+0x23c/0x250 [ 3529.859211][T23259] __alloc_pages+0x102/0x320 [ 3529.863791][T23259] alloc_pages+0x21d/0x310 06:28:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005e00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3529.868199][T23259] pte_alloc_one+0x29/0xb0 [ 3529.872655][T23259] __pte_alloc+0x2f/0x210 [ 3529.876999][T23259] copy_pte_range+0x128e/0x1460 [ 3529.881850][T23259] ? __alloc_pages+0x194/0x320 [ 3529.886627][T23259] copy_page_range+0x5da/0x8e0 [ 3529.891396][T23259] ? anon_vma_fork+0x273/0x2b0 [ 3529.896184][T23259] dup_mmap+0x6ab/0x9c0 [ 3529.900342][T23259] dup_mm+0x7c/0x210 [ 3529.904250][T23259] copy_process+0x1203/0x2e00 [ 3529.909024][T23259] kernel_clone+0x14b/0x680 [ 3529.913529][T23259] __se_sys_clone3+0x194/0x1d0 06:28:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006000034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3529.918284][T23259] ? __cond_resched+0x11/0x40 [ 3529.922970][T23259] ? perf_trace_sys_exit+0x4d/0x160 [ 3529.928163][T23259] ? fput+0x2d/0x130 [ 3529.932132][T23259] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3529.938201][T23259] ? syscall_trace_enter+0x153/0x290 [ 3529.943475][T23259] ? exit_to_user_mode_prepare+0x65/0x190 [ 3529.949204][T23259] __x64_sys_clone3+0x2d/0x40 [ 3529.953890][T23259] do_syscall_64+0x4a/0x90 [ 3529.958326][T23259] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3529.964232][T23259] RIP: 0033:0x4665d9 [ 3529.968154][T23259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3529.987782][T23259] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3529.988952][T23283] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 3529.996182][T23259] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3529.996198][T23259] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 06:28:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06050000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3529.996211][T23259] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3529.996224][T23259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3529.996235][T23259] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 [ 3530.048925][T23273] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3530.061223][T23264] tmpfs: Unknown parameter './bus' 06:28:04 executing program 2 (fault-call:3 fault-nth:93): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06060000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:04 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600902, 0x0, 0x12, r2, 0x0) 06:28:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3530.063322][T23283] netlink: 'syz-executor.5': attribute type 17 has an invalid length. [ 3530.072107][T23292] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=99 sclass=netlink_route_socket pid=23292 comm=syz-executor.3 [ 3530.092241][T23278] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3530.101145][T23273] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:28:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06070000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06170000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006600034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3530.153304][T23298] FAULT_INJECTION: forcing a failure. [ 3530.153304][T23298] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3530.166584][T23298] CPU: 1 PID: 23298 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3530.176753][T23298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3530.186800][T23298] Call Trace: [ 3530.190078][T23298] dump_stack+0x137/0x19d [ 3530.194471][T23298] should_fail+0x23c/0x250 [ 3530.199092][T23298] __alloc_pages+0x102/0x320 [ 3530.203676][T23298] alloc_pages+0x21d/0x310 [ 3530.208097][T23298] pte_alloc_one+0x29/0xb0 [ 3530.212515][T23298] ? kcsan_setup_watchpoint+0x231/0x3e0 [ 3530.218105][T23298] __pte_alloc+0x2f/0x210 [ 3530.222421][T23298] copy_pte_range+0x128e/0x1460 [ 3530.227346][T23298] ? __alloc_pages+0x194/0x320 [ 3530.232092][T23298] copy_page_range+0x5da/0x8e0 [ 3530.237151][T23298] ? __vma_link_rb+0x3c2/0x3e0 [ 3530.241913][T23298] ? up_write+0x25/0xc0 [ 3530.246104][T23298] dup_mmap+0x6ab/0x9c0 [ 3530.250270][T23298] dup_mm+0x7c/0x210 [ 3530.254171][T23298] copy_process+0x1203/0x2e00 [ 3530.258844][T23298] kernel_clone+0x14b/0x680 [ 3530.263354][T23298] __se_sys_clone3+0x194/0x1d0 [ 3530.268110][T23298] ? __cond_resched+0x11/0x40 [ 3530.272811][T23298] ? perf_trace_sys_exit+0x4d/0x160 [ 3530.277985][T23298] ? fput+0x2d/0x130 [ 3530.281914][T23298] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3530.288018][T23298] ? syscall_trace_enter+0x153/0x290 [ 3530.293283][T23298] ? exit_to_user_mode_prepare+0x65/0x190 [ 3530.299059][T23298] __x64_sys_clone3+0x2d/0x40 [ 3530.303734][T23298] do_syscall_64+0x4a/0x90 [ 3530.308141][T23298] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3530.314149][T23298] RIP: 0033:0x4665d9 [ 3530.318030][T23298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3530.337736][T23298] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3530.346242][T23298] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 06:28:04 executing program 2 (fault-call:3 fault-nth:94): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, 0x0, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3530.354249][T23298] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3530.362243][T23298] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3530.370225][T23298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3530.378184][T23298] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:28:04 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600a00, 0x0, 0x12, r2, 0x0) 06:28:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06080000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3530.439548][T23312] FAULT_INJECTION: forcing a failure. [ 3530.439548][T23312] name failslab, interval 1, probability 0, space 0, times 0 [ 3530.452176][T23312] CPU: 1 PID: 23312 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3530.462316][T23312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3530.472357][T23312] Call Trace: [ 3530.475712][T23312] dump_stack+0x137/0x19d [ 3530.480038][T23312] should_fail+0x23c/0x250 [ 3530.484451][T23312] ? dup_mmap+0x38e/0x9c0 06:28:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06090000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff060a0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3530.488829][T23312] __should_failslab+0x81/0x90 [ 3530.493596][T23312] should_failslab+0x5/0x20 [ 3530.498103][T23312] kmem_cache_alloc+0x46/0x2f0 [ 3530.502938][T23312] ? __vma_link_rb+0x3c2/0x3e0 [ 3530.507776][T23312] ? up_write+0x25/0xc0 [ 3530.511923][T23312] dup_mmap+0x38e/0x9c0 [ 3530.516074][T23312] dup_mm+0x7c/0x210 [ 3530.519958][T23312] copy_process+0x1203/0x2e00 [ 3530.524677][T23312] kernel_clone+0x14b/0x680 [ 3530.529173][T23312] __se_sys_clone3+0x194/0x1d0 [ 3530.533969][T23312] ? __cond_resched+0x11/0x40 06:28:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff060b0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3530.538673][T23312] ? perf_trace_sys_exit+0x4d/0x160 [ 3530.543900][T23312] ? fput+0x2d/0x130 [ 3530.547814][T23312] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3530.553883][T23312] ? syscall_trace_enter+0x153/0x290 [ 3530.559240][T23312] ? exit_to_user_mode_prepare+0x65/0x190 [ 3530.565044][T23312] __x64_sys_clone3+0x2d/0x40 [ 3530.569721][T23312] do_syscall_64+0x4a/0x90 [ 3530.574531][T23312] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3530.580429][T23312] RIP: 0033:0x4665d9 06:28:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff060c0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff060d0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3530.584316][T23312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3530.604003][T23312] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3530.612407][T23312] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3530.620378][T23312] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3530.628342][T23312] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:28:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff060e0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06180000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3530.636357][T23312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3530.644503][T23312] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:28:04 executing program 2 (fault-call:3 fault-nth:95): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:04 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600c00, 0x0, 0x12, r2, 0x0) 06:28:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, 0x0, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006900034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06100000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff061e0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3530.809015][T23366] FAULT_INJECTION: forcing a failure. [ 3530.809015][T23366] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3530.822252][T23366] CPU: 0 PID: 23366 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3530.832399][T23366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3530.842455][T23366] Call Trace: [ 3530.845726][T23366] dump_stack+0x137/0x19d [ 3530.850054][T23366] should_fail+0x23c/0x250 [ 3530.854467][T23366] __alloc_pages+0x102/0x320 [ 3530.859051][T23366] alloc_pages+0x21d/0x310 [ 3530.863468][T23366] pte_alloc_one+0x29/0xb0 [ 3530.867918][T23366] __pte_alloc+0x2f/0x210 [ 3530.872244][T23366] copy_pte_range+0x128e/0x1460 [ 3530.877095][T23366] ? __alloc_pages+0x194/0x320 [ 3530.881856][T23366] copy_page_range+0x5da/0x8e0 [ 3530.886632][T23366] ? __vma_link_rb+0x3c2/0x3e0 [ 3530.891448][T23366] ? up_write+0x25/0xc0 [ 3530.895598][T23366] dup_mmap+0x6ab/0x9c0 [ 3530.899775][T23366] dup_mm+0x7c/0x210 [ 3530.903728][T23366] copy_process+0x1203/0x2e00 06:28:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06110000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:05 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600f00, 0x0, 0x12, r2, 0x0) 06:28:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006c00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, 0x0, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06120000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3530.908396][T23366] kernel_clone+0x14b/0x680 [ 3530.912934][T23366] __se_sys_clone3+0x194/0x1d0 [ 3530.917716][T23366] ? __cond_resched+0x11/0x40 [ 3530.922469][T23366] ? perf_trace_sys_exit+0x4d/0x160 [ 3530.927735][T23366] ? fput+0x2d/0x130 [ 3530.931684][T23366] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3530.937815][T23366] ? syscall_trace_enter+0x153/0x290 [ 3530.943116][T23366] ? exit_to_user_mode_prepare+0x65/0x190 [ 3530.948859][T23366] __x64_sys_clone3+0x2d/0x40 [ 3530.953542][T23366] do_syscall_64+0x4a/0x90 06:28:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06250000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3530.958086][T23366] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3530.963979][T23366] RIP: 0033:0x4665d9 [ 3530.967862][T23366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3530.987584][T23366] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3530.995992][T23366] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3531.003997][T23366] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3531.011961][T23366] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3531.019929][T23366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3531.027928][T23366] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:28:05 executing program 2 (fault-call:3 fault-nth:96): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06480000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006f00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06220000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:05 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x602000, 0x0, 0x12, r2, 0x0) 06:28:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff064c0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007000034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3531.135527][T23404] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=111 sclass=netlink_route_socket pid=23404 comm=syz-executor.3 [ 3531.138635][T23402] FAULT_INJECTION: forcing a failure. [ 3531.138635][T23402] name failslab, interval 1, probability 0, space 0, times 0 [ 3531.161119][T23402] CPU: 0 PID: 23402 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3531.171320][T23402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3531.181579][T23402] Call Trace: 06:28:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06240000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3531.184857][T23402] dump_stack+0x137/0x19d [ 3531.189197][T23402] should_fail+0x23c/0x250 [ 3531.193626][T23402] ? dup_mmap+0x38e/0x9c0 [ 3531.197951][T23402] __should_failslab+0x81/0x90 [ 3531.202715][T23402] should_failslab+0x5/0x20 [ 3531.207218][T23402] kmem_cache_alloc+0x46/0x2f0 [ 3531.211984][T23402] ? __vma_link_rb+0x3c2/0x3e0 [ 3531.216743][T23402] ? up_write+0x25/0xc0 [ 3531.220934][T23402] dup_mmap+0x38e/0x9c0 [ 3531.225084][T23402] dup_mm+0x7c/0x210 [ 3531.228980][T23402] copy_process+0x1203/0x2e00 [ 3531.233661][T23402] kernel_clone+0x14b/0x680 [ 3531.238172][T23402] __se_sys_clone3+0x194/0x1d0 [ 3531.243032][T23402] ? __cond_resched+0x11/0x40 [ 3531.247702][T23402] ? perf_trace_sys_exit+0x4d/0x160 [ 3531.252893][T23402] ? fput+0x2d/0x130 [ 3531.256779][T23402] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3531.262841][T23402] ? syscall_trace_enter+0x153/0x290 [ 3531.268135][T23402] ? exit_to_user_mode_prepare+0x65/0x190 [ 3531.274016][T23402] __x64_sys_clone3+0x2d/0x40 [ 3531.278688][T23402] do_syscall_64+0x4a/0x90 06:28:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3531.283101][T23402] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3531.288991][T23402] RIP: 0033:0x4665d9 [ 3531.292889][T23402] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3531.308167][T23415] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=115 sclass=netlink_route_socket pid=23415 comm=syz-executor.3 [ 3531.312491][T23402] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 06:28:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007400034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06600000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3531.312528][T23402] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3531.312556][T23402] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3531.349752][T23402] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3531.357713][T23402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3531.365673][T23402] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:28:05 executing program 2 (fault-call:3 fault-nth:97): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06250000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:05 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x604000, 0x0, 0x12, r2, 0x0) 06:28:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06680000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff066c0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3531.463980][T23430] FAULT_INJECTION: forcing a failure. [ 3531.463980][T23430] name failslab, interval 1, probability 0, space 0, times 0 [ 3531.476612][T23430] CPU: 0 PID: 23430 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3531.486760][T23430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3531.496856][T23430] Call Trace: [ 3531.500173][T23430] dump_stack+0x137/0x19d [ 3531.504503][T23430] should_fail+0x23c/0x250 [ 3531.508952][T23430] ? dup_mmap+0x38e/0x9c0 06:28:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06740000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007500034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3531.513276][T23430] __should_failslab+0x81/0x90 [ 3531.518129][T23430] should_failslab+0x5/0x20 [ 3531.522627][T23430] kmem_cache_alloc+0x46/0x2f0 [ 3531.527397][T23430] ? __vma_link_rb+0x3c2/0x3e0 [ 3531.532213][T23430] ? up_write+0x25/0xc0 [ 3531.536361][T23430] dup_mmap+0x38e/0x9c0 [ 3531.540582][T23430] dup_mm+0x7c/0x210 [ 3531.544492][T23430] copy_process+0x1203/0x2e00 [ 3531.549159][T23430] kernel_clone+0x14b/0x680 [ 3531.553719][T23430] __se_sys_clone3+0x194/0x1d0 [ 3531.558580][T23430] ? __cond_resched+0x11/0x40 06:28:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff067a0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3531.563254][T23430] ? perf_trace_sys_exit+0x4d/0x160 [ 3531.568448][T23430] ? fput+0x2d/0x130 [ 3531.572340][T23430] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3531.578412][T23430] ? syscall_trace_enter+0x153/0x290 [ 3531.583802][T23430] ? exit_to_user_mode_prepare+0x65/0x190 [ 3531.589520][T23430] __x64_sys_clone3+0x2d/0x40 [ 3531.594203][T23430] do_syscall_64+0x4a/0x90 [ 3531.598624][T23430] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3531.604552][T23430] RIP: 0033:0x4665d9 06:28:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000300010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3531.608468][T23430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3531.628210][T23430] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3531.636615][T23430] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3531.644630][T23430] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3531.652594][T23430] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 06:28:05 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x60c000, 0x0, 0x12, r2, 0x0) 06:28:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007700034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3531.660647][T23430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3531.668609][T23430] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:28:05 executing program 2 (fault-call:3 fault-nth:98): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06480000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000500010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:05 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x60efff, 0x0, 0x12, r2, 0x0) [ 3531.738000][T23468] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=23468 comm=syz-executor.3 [ 3531.778896][T23476] FAULT_INJECTION: forcing a failure. [ 3531.778896][T23476] name failslab, interval 1, probability 0, space 0, times 0 [ 3531.791579][T23476] CPU: 0 PID: 23476 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3531.801832][T23476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3531.811877][T23476] Call Trace: [ 3531.815166][T23476] dump_stack+0x137/0x19d [ 3531.819551][T23476] should_fail+0x23c/0x250 [ 3531.823986][T23476] ? dup_mmap+0x38e/0x9c0 06:28:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007800034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3531.828309][T23476] __should_failslab+0x81/0x90 [ 3531.833070][T23476] should_failslab+0x5/0x20 [ 3531.837564][T23476] kmem_cache_alloc+0x46/0x2f0 [ 3531.842351][T23476] ? __vma_link_rb+0x3c2/0x3e0 [ 3531.847100][T23476] ? up_write+0x25/0xc0 [ 3531.851299][T23476] dup_mmap+0x38e/0x9c0 [ 3531.855446][T23476] dup_mm+0x7c/0x210 [ 3531.859358][T23476] copy_process+0x1203/0x2e00 [ 3531.864051][T23476] kernel_clone+0x14b/0x680 [ 3531.868294][T23488] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=120 sclass=netlink_route_socket pid=23488 comm=syz-executor.3 [ 3531.868550][T23476] __se_sys_clone3+0x194/0x1d0 [ 3531.887960][T23476] ? __cond_resched+0x11/0x40 [ 3531.892631][T23476] ? perf_trace_sys_exit+0x4d/0x160 [ 3531.897887][T23476] ? fput+0x2d/0x130 [ 3531.901778][T23476] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3531.907921][T23476] ? syscall_trace_enter+0x153/0x290 [ 3531.913201][T23476] ? exit_to_user_mode_prepare+0x65/0x190 [ 3531.918934][T23476] __x64_sys_clone3+0x2d/0x40 [ 3531.923603][T23476] do_syscall_64+0x4a/0x90 06:28:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3531.928048][T23476] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3531.933983][T23476] RIP: 0033:0x4665d9 [ 3531.937879][T23476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3531.956449][T23495] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=122 sclass=netlink_route_socket pid=23495 comm=syz-executor.3 [ 3531.957539][T23476] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 06:28:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000064e0004700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3531.957561][T23476] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3531.957574][T23476] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3531.994779][T23476] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3532.002744][T23476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3532.010787][T23476] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:28:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000600010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff064c0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3532.030806][T23484] tmpfs: Unknown parameter './bus' 06:28:06 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x60ffef, 0x0, 0x12, r2, 0x0) 06:28:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@private1, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:06 executing program 2 (fault-call:3 fault-nth:99): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000700010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3532.084636][T23499] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=57444 sclass=netlink_route_socket pid=23499 comm=syz-executor.3 06:28:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06600000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000900010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3532.170949][T23518] FAULT_INJECTION: forcing a failure. [ 3532.170949][T23518] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3532.184284][T23518] CPU: 1 PID: 23518 Comm: syz-executor.2 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3532.186605][T23526] __nla_validate_parse: 46 callbacks suppressed [ 3532.186686][T23526] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3532.194475][T23518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3532.220034][T23518] Call Trace: [ 3532.223304][T23518] dump_stack+0x137/0x19d [ 3532.227674][T23518] should_fail+0x23c/0x250 [ 3532.232080][T23518] __alloc_pages+0x102/0x320 [ 3532.236659][T23518] alloc_pages+0x21d/0x310 [ 3532.241159][T23518] pte_alloc_one+0x29/0xb0 [ 3532.245571][T23518] ? kcsan_setup_watchpoint+0x231/0x3e0 [ 3532.251133][T23518] __pte_alloc+0x2f/0x210 [ 3532.255458][T23518] copy_pte_range+0x128e/0x1460 [ 3532.260309][T23518] ? __alloc_pages+0x194/0x320 [ 3532.264165][T23532] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3684 sclass=netlink_route_socket pid=23532 comm=syz-executor.3 [ 3532.265061][T23518] copy_page_range+0x5da/0x8e0 [ 3532.265089][T23518] ? __vma_link_rb+0x3c2/0x3e0 [ 3532.287540][T23518] ? up_write+0x25/0xc0 [ 3532.291682][T23518] dup_mmap+0x6ab/0x9c0 [ 3532.295913][T23518] dup_mm+0x7c/0x210 [ 3532.299815][T23518] copy_process+0x1203/0x2e00 [ 3532.304566][T23518] kernel_clone+0x14b/0x680 [ 3532.309161][T23518] __se_sys_clone3+0x194/0x1d0 [ 3532.314011][T23518] ? __cond_resched+0x11/0x40 06:28:06 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x1d350000, 0x0, 0x12, r2, 0x0) 06:28:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000a00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000640e014700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@private1, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006402034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3532.318796][T23518] ? perf_trace_sys_exit+0x4d/0x160 [ 3532.323994][T23518] ? fput+0x2d/0x130 [ 3532.327882][T23518] ? fpregs_assert_state_consistent+0x7d/0x90 [ 3532.334039][T23518] ? syscall_trace_enter+0x153/0x290 [ 3532.339334][T23518] ? exit_to_user_mode_prepare+0x65/0x190 [ 3532.345115][T23518] __x64_sys_clone3+0x2d/0x40 [ 3532.349878][T23518] do_syscall_64+0x4a/0x90 [ 3532.350731][T23540] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=612 sclass=netlink_route_socket pid=23540 comm=syz-executor.3 06:28:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006403034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3532.354331][T23518] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3532.354357][T23518] RIP: 0033:0x4665d9 [ 3532.377082][T23518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3532.396740][T23518] RSP: 002b:00007fcc7aea9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3532.405180][T23518] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3532.413184][T23518] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000740 [ 3532.421147][T23518] RBP: 00007fcc7aea91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3532.429131][T23518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 3532.437100][T23518] R13: 00007fff8a13aabf R14: 00007fcc7aea9300 R15: 0000000000022000 06:28:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@private1, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000b00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06680000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3532.468160][T23546] tmpfs: Unknown parameter './bus' [ 3532.474700][T23543] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=868 sclass=netlink_route_socket pid=23543 comm=syz-executor.3 06:28:06 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x7fffdffff000, 0x0, 0x12, r2, 0x0) 06:28:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006404034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3532.520186][T23554] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. 06:28:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240), &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff066c0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000c00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3532.570481][T23564] tmpfs: Unknown parameter './bus' 06:28:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000002, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:06 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x7ffffffff000, 0x0, 0x12, r2, 0x0) 06:28:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240), &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06740000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000d00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000004, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3532.610568][T23567] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1124 sclass=netlink_route_socket pid=23567 comm=syz-executor.3 [ 3532.628676][T23577] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. 06:28:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006405034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240), &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3532.700341][T23589] tmpfs: Unknown parameter './bus' [ 3532.711148][T23595] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. 06:28:06 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x7fffffffffffffff, 0x0, 0x12, r2, 0x0) 06:28:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000005, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000e00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff067a0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006406034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3532.799453][T23610] tmpfs: Unknown parameter './bus' 06:28:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240), &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:06 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, 0x12, r2, 0x0) 06:28:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000008, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06900000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3532.826418][T23623] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. 06:28:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06c11000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006407034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240), &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3, 0x12, r2, 0x0) 06:28:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06c00000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000010, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006408034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06001100010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3532.935748][T23648] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. 06:28:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240), &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006409034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06e80000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x4, 0x12, r2, 0x0) 06:28:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000011, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06001200010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3533.029639][T23665] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. 06:28:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000640a034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000030, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:07 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x5, 0x12, r2, 0x0) 06:28:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3533.113912][T23684] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. 06:28:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06fd0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000640b034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06002000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000041, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:07 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xa, 0x12, r2, 0x0) 06:28:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000640c034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3533.227981][T23706] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. 06:28:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06840100010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06002500010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000640d034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, 0x0, 0x0) 06:28:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000060, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:07 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xc, 0x12, r2, 0x0) 06:28:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff067a0200010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3533.336431][T23722] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. 06:28:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000640e034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06004800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, 0x0, 0x0) 06:28:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f0000ae, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:07 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xf, 0x12, r2, 0x0) 06:28:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006410034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff069e0200010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, 0x0, 0x0) 06:28:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06004c00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006411034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06006000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3533.527154][T23750] ================================================================== [ 3533.535249][T23750] BUG: KCSAN: data-race in shmem_getpage_gfp / shmem_setattr [ 3533.542637][T23750] [ 3533.544949][T23750] write to 0xffff88813026dde0 of 8 bytes by task 23753 on cpu 0: [ 3533.552653][T23750] shmem_setattr+0x299/0x450 [ 3533.557231][T23750] notify_change+0x8a3/0xa80 [ 3533.561811][T23750] do_sys_ftruncate+0x405/0x4c0 [ 3533.566655][T23750] __x64_sys_ftruncate+0x2f/0x40 [ 3533.571589][T23750] do_syscall_64+0x4a/0x90 06:28:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06006800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3533.576018][T23750] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3533.581905][T23750] [ 3533.584215][T23750] read to 0xffff88813026dde0 of 8 bytes by task 23750 on cpu 1: [ 3533.591830][T23750] shmem_getpage_gfp+0x1a5/0x1410 [ 3533.596853][T23750] shmem_fault+0x16d/0x500 [ 3533.601319][T23750] handle_mm_fault+0x128f/0x1a70 [ 3533.606253][T23750] do_user_addr_fault+0x609/0xc00 [ 3533.611269][T23750] exc_page_fault+0x91/0x230 [ 3533.615854][T23750] asm_exc_page_fault+0x1e/0x30 [ 3533.620695][T23750] 06:28:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006412034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06006c00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3533.623004][T23750] value changed: 0x0000000000000000 -> 0x0000000000208200 [ 3533.630096][T23750] [ 3533.632438][T23750] Reported by Kernel Concurrency Sanitizer on: [ 3533.638576][T23750] CPU: 1 PID: 23750 Comm: syz-executor.0 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3533.648718][T23750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3533.658763][T23750] ================================================================== 06:28:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006425034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0), 0x0) 06:28:07 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x10, 0x12, r2, 0x0) 06:28:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06007400010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006448034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f001f00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff063e0300010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xc0, 0x12, r2, 0x0) 06:28:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0), 0x0) 06:28:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06007a00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000644c034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff066e0300010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0), 0x0) 06:28:08 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xef, 0x12, r2, 0x0) 06:28:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f002000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006460034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff0610c100010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{0x0}], 0x1) 06:28:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06740300010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000000020000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006468034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{0x0}], 0x1) 06:28:08 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x209, 0x12, r2, 0x0) 06:28:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f003000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000500010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000000030000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{0x0}], 0x1) 06:28:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000646c034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000600010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000000080000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)}], 0x1) 06:28:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006474034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x300, 0x12, r2, 0x0) 06:28:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000700010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f003f00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)}], 0x1) 06:28:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000647a034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff060000000a0000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x500, 0x12, r2, 0x0) 06:28:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)}], 0x1) 06:28:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400054700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x902, 0x12, r2, 0x0) 06:28:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025", 0x1d}], 0x1) 06:28:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000900010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000000250000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400064700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025", 0x1d}], 0x1) 06:28:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400074700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:08 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xa00, 0x12, r2, 0x0) 06:28:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025", 0x1d}], 0x1) 06:28:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000000640000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f004100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000a00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400094700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:09 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xc00, 0x12, r2, 0x0) 06:28:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad00020000", 0x2b}], 0x1) 06:28:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000002b90000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad00020000", 0x2b}], 0x1) 06:28:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff067ffffff20000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:09 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xf00, 0x12, r2, 0x0) 06:28:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000064000a4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f006000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3535.212151][T23969] validate_nla: 161 callbacks suppressed [ 3535.212167][T23969] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 3535.241314][T23975] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:28:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff067ffffff80000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3535.288357][T23975] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3535.301095][T23987] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 3535.317150][T23975] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:28:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000064000b4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000b00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad00020000", 0x2b}], 0x1) 06:28:09 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2000, 0x12, r2, 0x0) [ 3535.342806][T23993] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:28:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff067ffffff90000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000064000c4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff067fffffff0000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:09 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x351d, 0x12, r2, 0x0) [ 3535.419402][T24008] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 3535.428260][T24012] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 3535.444695][T24012] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:28:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad0002000000000000060400", 0x32}], 0x1) 06:28:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000200010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3535.480242][T24012] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:28:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f008fff, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000064000d4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000c00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad0002000000000000060400", 0x32}], 0x1) 06:28:10 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x4000, 0x12, r2, 0x0) 06:28:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000300010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f00ae00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad0002000000000000060400", 0x32}], 0x1) 06:28:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000400010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000064000e4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f00ff8f, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:10 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x6000, 0x12, r2, 0x0) 06:28:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000500010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000d00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000", 0x36}], 0x1) 06:28:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400114700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000600010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xc000, 0x12, r2, 0x0) 06:28:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000e00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000700010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000", 0x36}], 0x1) 06:28:10 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xefff, 0x12, r2, 0x0) 06:28:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400124700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06001100010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400024700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000900010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06001200010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000", 0x36}], 0x1) 06:28:10 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xffef, 0x12, r2, 0x0) 06:28:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06001600010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad0002000000000000060400000000000000", 0x38}], 0x1) 06:28:10 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15180, 0x12, r2, 0x0) 06:28:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000a00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400044700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad0002000000000000060400000000000000", 0x38}], 0x1) 06:28:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06001700010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000b00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400054700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x100000, 0x12, r2, 0x0) 06:28:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06001800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400064700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad0002000000000000060400000000000000", 0x38}], 0x1) 06:28:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x5}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000c00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06001e00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x100020, 0x12, r2, 0x0) 06:28:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06680000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x8}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400074700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000d00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06001f00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x200000, 0x12, r2, 0x0) 06:28:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400084700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000e00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x10}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06002000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06001000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x208200, 0x12, r2, 0x0) 06:28:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400094700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 5 (fault-call:8 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x11}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3537.083114][T24243] FAULT_INJECTION: forcing a failure. [ 3537.083114][T24243] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3537.096287][T24243] CPU: 0 PID: 24243 Comm: syz-executor.5 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3537.106615][T24243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3537.116662][T24243] Call Trace: [ 3537.119935][T24243] dump_stack+0x137/0x19d [ 3537.124264][T24243] should_fail+0x23c/0x250 [ 3537.128674][T24243] should_fail_usercopy+0x16/0x20 [ 3537.133743][T24243] _copy_from_user+0x1c/0xd0 [ 3537.138423][T24243] iovec_from_user+0xc4/0x2d0 [ 3537.143118][T24243] ? kstrtoull+0x30e/0x350 [ 3537.147530][T24243] __import_iovec+0x49/0x270 [ 3537.152120][T24243] ? fsnotify_perm+0x59/0x2e0 [ 3537.156879][T24243] import_iovec+0x69/0x80 [ 3537.161246][T24243] do_writev+0x107/0x400 [ 3537.165582][T24243] ? __fget_light+0x21b/0x260 [ 3537.170261][T24243] ? __cond_resched+0x11/0x40 [ 3537.174966][T24243] ? perf_trace_sys_exit+0x4d/0x160 06:28:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06002200010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x5fffff, 0x12, r2, 0x0) 06:28:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06001100010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000064000a4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x41}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3537.180162][T24243] ? fput+0x2d/0x130 [ 3537.184061][T24243] ? syscall_trace_enter+0x153/0x290 [ 3537.189419][T24243] __x64_sys_writev+0x41/0x50 [ 3537.194095][T24243] do_syscall_64+0x4a/0x90 [ 3537.198533][T24243] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3537.204543][T24243] RIP: 0033:0x4665d9 [ 3537.208433][T24243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3537.228129][T24243] RSP: 002b:00007f2699d99188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 3537.236635][T24243] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3537.244596][T24243] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000003 [ 3537.245047][T24265] __nla_validate_parse: 43 callbacks suppressed [ 3537.245060][T24265] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3537.252574][T24243] RBP: 00007f2699d991d0 R08: 0000000000000000 R09: 0000000000000000 [ 3537.252590][T24243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 06:28:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000064000b4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x60}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:11 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x600000, 0x12, r2, 0x0) 06:28:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06002400010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3537.252604][T24243] R13: 00007ffe65f9281f R14: 00007f2699d99300 R15: 0000000000022000 [ 3537.317392][T24281] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 06:28:11 executing program 5 (fault-call:8 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06001200010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0xae}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000064000c4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000064000d4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3537.405534][T24293] FAULT_INJECTION: forcing a failure. [ 3537.405534][T24293] name failslab, interval 1, probability 0, space 0, times 0 [ 3537.418178][T24293] CPU: 0 PID: 24293 Comm: syz-executor.5 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3537.429280][T24293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3537.439556][T24293] Call Trace: [ 3537.442843][T24293] dump_stack+0x137/0x19d [ 3537.447190][T24293] should_fail+0x23c/0x250 06:28:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000064000e4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3537.448722][T24301] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3537.451635][T24293] __should_failslab+0x81/0x90 [ 3537.451665][T24293] should_failslab+0x5/0x20 [ 3537.451680][T24293] kmem_cache_alloc_node+0x58/0x2b0 [ 3537.451703][T24293] ? rmqueue+0x43/0xd00 [ 3537.479517][T24293] ? __alloc_skb+0xed/0x420 [ 3537.484047][T24293] __alloc_skb+0xed/0x420 [ 3537.488378][T24293] netlink_sendmsg+0x4c7/0x7c0 [ 3537.493218][T24293] sock_write_iter+0x1a4/0x200 [ 3537.497975][T24293] do_iter_readv_writev+0x2cb/0x360 [ 3537.503171][T24293] do_iter_write+0x112/0x4c0 [ 3537.507949][T24293] ? import_iovec+0x69/0x80 [ 3537.512476][T24293] do_writev+0x1e0/0x400 [ 3537.516719][T24293] ? __cond_resched+0x11/0x40 [ 3537.521414][T24293] ? perf_trace_sys_exit+0x4d/0x160 [ 3537.526621][T24293] ? fput+0x2d/0x130 [ 3537.530536][T24293] ? syscall_trace_enter+0x153/0x290 [ 3537.535822][T24293] __x64_sys_writev+0x41/0x50 [ 3537.540562][T24293] do_syscall_64+0x4a/0x90 [ 3537.545096][T24293] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3537.551035][T24293] RIP: 0033:0x4665d9 06:28:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06002500010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3537.554917][T24293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3537.574552][T24293] RSP: 002b:00007f2699d99188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 3537.582960][T24293] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3537.590934][T24293] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000003 06:28:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06002500010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400104700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x500}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3537.598901][T24293] RBP: 00007f2699d991d0 R08: 0000000000000000 R09: 0000000000000000 [ 3537.606878][T24293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3537.614839][T24293] R13: 00007ffe65f9281f R14: 00007f2699d99300 R15: 0000000000022000 [ 3537.636221][T24309] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. 06:28:11 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800000, 0x12, r2, 0x0) 06:28:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400114700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 5 (fault-call:8 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x1100}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06004800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06033e00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3537.734095][T24328] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3537.741735][T24333] FAULT_INJECTION: forcing a failure. [ 3537.741735][T24333] name failslab, interval 1, probability 0, space 0, times 0 [ 3537.756086][T24333] CPU: 0 PID: 24333 Comm: syz-executor.5 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3537.766336][T24333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3537.776409][T24333] Call Trace: [ 3537.779681][T24333] dump_stack+0x137/0x19d 06:28:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x1f00}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3537.784013][T24333] should_fail+0x23c/0x250 [ 3537.788512][T24333] __should_failslab+0x81/0x90 [ 3537.793287][T24333] should_failslab+0x5/0x20 [ 3537.797781][T24333] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 3537.803535][T24333] ? __kmalloc_node_track_caller+0x30/0x40 [ 3537.809335][T24333] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 3537.814810][T24333] __kmalloc_node_track_caller+0x30/0x40 [ 3537.820499][T24333] ? netlink_sendmsg+0x4c7/0x7c0 [ 3537.825486][T24333] __alloc_skb+0x187/0x420 [ 3537.829960][T24333] netlink_sendmsg+0x4c7/0x7c0 06:28:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06004c00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3537.834775][T24333] sock_write_iter+0x1a4/0x200 [ 3537.839544][T24333] do_iter_readv_writev+0x2cb/0x360 [ 3537.844743][T24333] do_iter_write+0x112/0x4c0 [ 3537.849327][T24333] ? import_iovec+0x69/0x80 [ 3537.853859][T24333] do_writev+0x1e0/0x400 [ 3537.858132][T24333] ? __cond_resched+0x11/0x40 [ 3537.862805][T24333] ? perf_trace_sys_exit+0x4d/0x160 [ 3537.868042][T24333] ? fput+0x2d/0x130 [ 3537.871934][T24333] ? syscall_trace_enter+0x153/0x290 [ 3537.877312][T24333] __x64_sys_writev+0x41/0x50 [ 3537.882039][T24333] do_syscall_64+0x4a/0x90 [ 3537.886462][T24333] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3537.892398][T24333] RIP: 0033:0x4665d9 [ 3537.896282][T24333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3537.915985][T24333] RSP: 002b:00007f2699d99188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 3537.923040][T24335] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 06:28:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x2000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06006000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3537.924399][T24333] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3537.924417][T24333] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000003 [ 3537.949564][T24333] RBP: 00007f2699d991d0 R08: 0000000000000000 R09: 0000000000000000 [ 3537.957673][T24333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3537.965672][T24333] R13: 00007ffe65f9281f R14: 00007f2699d99300 R15: 0000000000022000 [ 3537.975081][T24327] tmpfs: Unknown parameter './bus' 06:28:12 executing program 5 (fault-call:8 fault-nth:3): r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400124700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:12 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x822000, 0x12, r2, 0x0) 06:28:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06003f00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400033500bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3538.045257][T24358] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3538.068224][T24359] FAULT_INJECTION: forcing a failure. [ 3538.068224][T24359] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3538.081270][T24359] CPU: 0 PID: 24359 Comm: syz-executor.5 Tainted: G W 5.13.0-rc7-syzkaller #0 06:28:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x3000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3538.091495][T24359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3538.098251][T24370] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3538.101584][T24359] Call Trace: [ 3538.101594][T24359] dump_stack+0x137/0x19d [ 3538.118541][T24359] should_fail+0x23c/0x250 [ 3538.123033][T24359] should_fail_usercopy+0x16/0x20 [ 3538.128119][T24359] _copy_from_iter_full+0x148/0xa10 [ 3538.133356][T24359] ? check_stack_object+0x61/0x70 [ 3538.138547][T24359] ? __virt_addr_valid+0x15a/0x1a0 06:28:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400034702bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3538.143780][T24359] ? __check_object_size+0x253/0x310 [ 3538.149099][T24359] netlink_sendmsg+0x579/0x7c0 [ 3538.153861][T24359] sock_write_iter+0x1a4/0x200 [ 3538.158733][T24359] do_iter_readv_writev+0x2cb/0x360 [ 3538.163929][T24359] do_iter_write+0x112/0x4c0 [ 3538.168668][T24359] ? import_iovec+0x69/0x80 [ 3538.173166][T24359] do_writev+0x1e0/0x400 [ 3538.177403][T24359] ? __cond_resched+0x11/0x40 [ 3538.182074][T24359] ? perf_trace_sys_exit+0x4d/0x160 [ 3538.187485][T24359] ? fput+0x2d/0x130 06:28:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x3f00}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3538.191439][T24359] ? syscall_trace_enter+0x153/0x290 [ 3538.196876][T24359] __x64_sys_writev+0x41/0x50 [ 3538.201612][T24359] do_syscall_64+0x4a/0x90 [ 3538.206098][T24359] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3538.212106][T24359] RIP: 0033:0x4665d9 [ 3538.216030][T24359] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3538.235641][T24359] RSP: 002b:00007f2699d99188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 06:28:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06004800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06006800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3538.244085][T24359] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3538.248545][T24363] tmpfs: Unknown parameter './bus' [ 3538.252127][T24359] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000003 [ 3538.252142][T24359] RBP: 00007f2699d991d0 R08: 0000000000000000 R09: 0000000000000000 [ 3538.273322][T24359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3538.281300][T24359] R13: 00007ffe65f9281f R14: 00007f2699d99300 R15: 0000000000022000 06:28:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400034703bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:12 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1000000, 0x12, r2, 0x0) 06:28:12 executing program 5 (fault-call:8 fault-nth:4): r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x4000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3538.346843][T24386] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. 06:28:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06006c00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:12 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2000000, 0x12, r2, 0x0) [ 3538.387395][T24392] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3538.429345][T24398] FAULT_INJECTION: forcing a failure. [ 3538.429345][T24398] name failslab, interval 1, probability 0, space 0, times 0 [ 3538.442047][T24398] CPU: 1 PID: 24398 Comm: syz-executor.5 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3538.452196][T24398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3538.462254][T24398] Call Trace: [ 3538.465528][T24398] dump_stack+0x137/0x19d [ 3538.469858][T24398] should_fail+0x23c/0x250 [ 3538.474277][T24398] __should_failslab+0x81/0x90 06:28:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06004c00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06007400010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400034704bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3538.479041][T24398] should_failslab+0x5/0x20 [ 3538.483545][T24398] kmem_cache_alloc_node+0x58/0x2b0 [ 3538.488750][T24398] ? __dev_open+0x314/0x3a0 [ 3538.493253][T24398] ? __alloc_skb+0xed/0x420 [ 3538.497758][T24398] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 3538.503584][T24398] __alloc_skb+0xed/0x420 [ 3538.507907][T24398] rtmsg_ifinfo_build_skb+0x61/0x130 [ 3538.513241][T24398] rtmsg_ifinfo+0x58/0xc0 [ 3538.517567][T24398] __dev_notify_flags+0x63/0x3a0 [ 3538.522502][T24398] dev_change_flags+0xa2/0xc0 06:28:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x4100}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3538.527178][T24398] do_setlink+0x785/0x2380 [ 3538.531767][T24398] ? __nla_validate_parse+0x10ed/0x17f0 [ 3538.537313][T24398] ? __nla_parse+0x3c/0x50 [ 3538.541738][T24398] rtnl_setlink+0x237/0x280 [ 3538.546291][T24398] ? rtnl_dump_ifinfo+0xc70/0xc70 [ 3538.551374][T24398] rtnetlink_rcv_msg+0x6f4/0x7a0 [ 3538.556388][T24398] ? put_dec_trunc8+0x10e/0x130 [ 3538.561260][T24398] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 3538.567071][T24398] ? __wake_up+0x8d/0xc0 [ 3538.571388][T24398] ? __d_rehash+0x125/0x180 [ 3538.575936][T24398] ? __d_add+0x3bf/0x490 [ 3538.580231][T24398] ? avc_has_perm_noaudit+0x19a/0x240 [ 3538.585659][T24398] ? rhashtable_jhash2+0x13a/0x1a0 [ 3538.590775][T24398] ? jhash+0x2b0/0x2b0 [ 3538.594900][T24398] netlink_rcv_skb+0x13e/0x240 [ 3538.599688][T24398] ? rtnetlink_bind+0x60/0x60 [ 3538.604379][T24398] rtnetlink_rcv+0x18/0x20 [ 3538.608804][T24398] netlink_unicast+0x5ec/0x6b0 [ 3538.613624][T24398] netlink_sendmsg+0x6f8/0x7c0 [ 3538.618426][T24398] sock_write_iter+0x1a4/0x200 [ 3538.623182][T24398] do_iter_readv_writev+0x2cb/0x360 06:28:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06007a00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3538.628488][T24398] do_iter_write+0x112/0x4c0 [ 3538.633177][T24398] ? import_iovec+0x69/0x80 [ 3538.637703][T24398] do_writev+0x1e0/0x400 [ 3538.641949][T24398] ? __cond_resched+0x11/0x40 [ 3538.646627][T24398] ? perf_trace_sys_exit+0x4d/0x160 [ 3538.651919][T24398] ? fput+0x2d/0x130 [ 3538.655805][T24398] ? syscall_trace_enter+0x153/0x290 [ 3538.661081][T24398] __x64_sys_writev+0x41/0x50 [ 3538.665762][T24398] do_syscall_64+0x4a/0x90 [ 3538.670185][T24398] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3538.676081][T24398] RIP: 0033:0x4665d9 06:28:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x6000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3538.679968][T24398] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3538.699571][T24398] RSP: 002b:00007f2699d99188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 3538.707978][T24398] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3538.715966][T24398] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000003 06:28:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000003010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3538.723970][T24398] RBP: 00007f2699d991d0 R08: 0000000000000000 R09: 0000000000000000 [ 3538.732047][T24398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3538.740055][T24398] R13: 00007ffe65f9281f R14: 00007f2699d99300 R15: 0000000000022000 06:28:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400034705bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:12 executing program 5 (fault-call:8 fault-nth:5): r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06006000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x8fff}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:12 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3000000, 0x12, r2, 0x0) 06:28:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000005010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400034706bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3538.845413][T24430] FAULT_INJECTION: forcing a failure. [ 3538.845413][T24430] name failslab, interval 1, probability 0, space 0, times 0 [ 3538.858045][T24430] CPU: 1 PID: 24430 Comm: syz-executor.5 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3538.868203][T24430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3538.878250][T24430] Call Trace: [ 3538.881519][T24430] dump_stack+0x137/0x19d [ 3538.885853][T24430] should_fail+0x23c/0x250 [ 3538.890283][T24430] __should_failslab+0x81/0x90 06:28:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000006010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3538.895051][T24430] should_failslab+0x5/0x20 [ 3538.899560][T24430] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 3538.905297][T24430] ? __kmalloc_node_track_caller+0x30/0x40 [ 3538.911169][T24430] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 3538.916888][T24430] __kmalloc_node_track_caller+0x30/0x40 [ 3538.922525][T24430] ? rtmsg_ifinfo_build_skb+0x61/0x130 [ 3538.927990][T24430] __alloc_skb+0x187/0x420 [ 3538.932417][T24430] rtmsg_ifinfo_build_skb+0x61/0x130 [ 3538.937738][T24430] rtmsg_ifinfo+0x58/0xc0 06:28:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0xae00}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3538.942111][T24430] __dev_notify_flags+0x63/0x3a0 [ 3538.947059][T24430] dev_change_flags+0xa2/0xc0 [ 3538.951740][T24430] do_setlink+0x785/0x2380 [ 3538.956157][T24430] ? __nla_validate_parse+0x10ed/0x17f0 [ 3538.961732][T24430] ? __nla_parse+0x3c/0x50 [ 3538.966146][T24430] rtnl_setlink+0x237/0x280 [ 3538.970658][T24430] ? rtnl_dump_ifinfo+0xc70/0xc70 [ 3538.975687][T24430] rtnetlink_rcv_msg+0x6f4/0x7a0 [ 3538.980626][T24430] ? put_dec_trunc8+0x10e/0x130 [ 3538.985532][T24430] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 3538.991426][T24430] ? __wake_up+0x8d/0xc0 [ 3538.995753][T24430] ? __d_rehash+0x125/0x180 [ 3539.000251][T24430] ? __d_add+0x3bf/0x490 [ 3539.004507][T24430] ? avc_has_perm_noaudit+0x19a/0x240 [ 3539.009891][T24430] ? rhashtable_jhash2+0x13a/0x1a0 [ 3539.015074][T24430] ? jhash+0x2b0/0x2b0 [ 3539.019232][T24430] netlink_rcv_skb+0x13e/0x240 [ 3539.024018][T24430] ? rtnetlink_bind+0x60/0x60 [ 3539.028780][T24430] rtnetlink_rcv+0x18/0x20 [ 3539.033317][T24430] netlink_unicast+0x5ec/0x6b0 [ 3539.038096][T24430] netlink_sendmsg+0x6f8/0x7c0 06:28:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000007010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3539.042894][T24430] sock_write_iter+0x1a4/0x200 [ 3539.047676][T24430] do_iter_readv_writev+0x2cb/0x360 [ 3539.052891][T24430] do_iter_write+0x112/0x4c0 [ 3539.057506][T24430] ? import_iovec+0x69/0x80 [ 3539.062013][T24430] do_writev+0x1e0/0x400 [ 3539.066250][T24430] ? __cond_resched+0x11/0x40 [ 3539.070980][T24430] ? perf_trace_sys_exit+0x4d/0x160 [ 3539.076184][T24430] ? fput+0x2d/0x130 [ 3539.080185][T24430] ? syscall_trace_enter+0x153/0x290 [ 3539.085472][T24430] __x64_sys_writev+0x41/0x50 [ 3539.090141][T24430] do_syscall_64+0x4a/0x90 06:28:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff06000009010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3539.094602][T24430] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3539.100516][T24430] RIP: 0033:0x4665d9 [ 3539.104396][T24430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3539.123998][T24430] RSP: 002b:00007f2699d99188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 3539.132408][T24430] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 06:28:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400034707bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0xff8f}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3539.140391][T24430] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000003 [ 3539.148422][T24430] RBP: 00007f2699d991d0 R08: 0000000000000000 R09: 0000000000000000 [ 3539.156449][T24430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3539.164431][T24430] R13: 00007ffe65f9281f R14: 00007f2699d99300 R15: 0000000000022000 06:28:13 executing program 5 (fault-call:8 fault-nth:6): r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff0600000a010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06006800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:13 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x4000000, 0x12, r2, 0x0) 06:28:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400034708bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x20200}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000006400034709bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3539.295395][T24470] FAULT_INJECTION: forcing a failure. [ 3539.295395][T24470] name failslab, interval 1, probability 0, space 0, times 0 [ 3539.308039][T24470] CPU: 1 PID: 24470 Comm: syz-executor.5 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3539.318278][T24470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3539.328380][T24470] Call Trace: [ 3539.331648][T24470] dump_stack+0x137/0x19d [ 3539.336087][T24470] should_fail+0x23c/0x250 [ 3539.340564][T24470] __should_failslab+0x81/0x90 06:28:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06006c00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3539.345405][T24470] should_failslab+0x5/0x20 [ 3539.349906][T24470] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 3539.355640][T24470] ? __kmalloc_node_track_caller+0x30/0x40 [ 3539.361450][T24470] ? netlink_trim+0x112/0x140 [ 3539.366291][T24470] __kmalloc_node_track_caller+0x30/0x40 [ 3539.372014][T24470] pskb_expand_head+0xc9/0x920 [ 3539.376795][T24470] ? skb_trim+0x8c/0xb0 [ 3539.381087][T24470] ? rtnl_fill_ifinfo+0x23ae/0x2420 [ 3539.386316][T24470] netlink_trim+0x112/0x140 06:28:13 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x5000000, 0x12, r2, 0x0) [ 3539.390819][T24470] netlink_broadcast_filtered+0x47/0xb90 [ 3539.396468][T24470] ? rtmsg_ifinfo_build_skb+0xa8/0x130 [ 3539.401964][T24470] nlmsg_notify+0xcc/0x180 [ 3539.406377][T24470] rtmsg_ifinfo+0xa4/0xc0 [ 3539.410711][T24470] __dev_notify_flags+0x63/0x3a0 [ 3539.415660][T24470] dev_change_flags+0xa2/0xc0 [ 3539.420346][T24470] do_setlink+0x785/0x2380 [ 3539.424783][T24470] ? __nla_validate_parse+0x10ed/0x17f0 [ 3539.430412][T24470] ? __nla_parse+0x3c/0x50 [ 3539.434949][T24470] rtnl_setlink+0x237/0x280 [ 3539.439452][T24470] ? rtnl_dump_ifinfo+0xc70/0xc70 06:28:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff0600000b010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x3ffff}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3539.444487][T24470] rtnetlink_rcv_msg+0x6f4/0x7a0 [ 3539.449509][T24470] ? put_dec_trunc8+0x10e/0x130 [ 3539.454410][T24470] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 3539.460217][T24470] ? __wake_up+0x8d/0xc0 [ 3539.464539][T24470] ? __d_rehash+0x125/0x180 [ 3539.469034][T24470] ? __d_add+0x3bf/0x490 [ 3539.473321][T24470] ? avc_has_perm_noaudit+0x19a/0x240 [ 3539.478740][T24470] ? rhashtable_jhash2+0x13a/0x1a0 [ 3539.483883][T24470] ? jhash+0x2b0/0x2b0 [ 3539.488000][T24470] netlink_rcv_skb+0x13e/0x240 [ 3539.492767][T24470] ? rtnetlink_bind+0x60/0x60 [ 3539.497481][T24470] rtnetlink_rcv+0x18/0x20 [ 3539.501940][T24470] netlink_unicast+0x5ec/0x6b0 [ 3539.506704][T24470] netlink_sendmsg+0x6f8/0x7c0 [ 3539.511579][T24470] sock_write_iter+0x1a4/0x200 [ 3539.516354][T24470] do_iter_readv_writev+0x2cb/0x360 [ 3539.521665][T24470] do_iter_write+0x112/0x4c0 [ 3539.526243][T24470] ? import_iovec+0x69/0x80 [ 3539.530770][T24470] do_writev+0x1e0/0x400 [ 3539.535010][T24470] ? __cond_resched+0x11/0x40 [ 3539.539705][T24470] ? perf_trace_sys_exit+0x4d/0x160 06:28:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x40000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3539.544894][T24470] ? fput+0x2d/0x130 [ 3539.548810][T24470] ? syscall_trace_enter+0x153/0x290 [ 3539.554089][T24470] __x64_sys_writev+0x41/0x50 [ 3539.558898][T24470] do_syscall_64+0x4a/0x90 [ 3539.563381][T24470] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3539.569271][T24470] RIP: 0033:0x4665d9 [ 3539.573149][T24470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 06:28:13 executing program 5 (fault-call:8 fault-nth:7): r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3539.592783][T24470] RSP: 002b:00007f2699d99188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 3539.601189][T24470] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3539.609153][T24470] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000003 [ 3539.617117][T24470] RBP: 00007f2699d991d0 R08: 0000000000000000 R09: 0000000000000000 [ 3539.625081][T24470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3539.633055][T24470] R13: 00007ffe65f9281f R14: 00007f2699d99300 R15: 0000000000022000 06:28:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff0600000c010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x80000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000640003470abb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06036e00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:13 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x9020000, 0x12, r2, 0x0) [ 3539.727030][T24503] FAULT_INJECTION: forcing a failure. [ 3539.727030][T24503] name failslab, interval 1, probability 0, space 0, times 0 [ 3539.739670][T24503] CPU: 0 PID: 24503 Comm: syz-executor.5 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3539.749822][T24503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3539.759870][T24503] Call Trace: [ 3539.763139][T24503] dump_stack+0x137/0x19d [ 3539.767473][T24503] should_fail+0x23c/0x250 [ 3539.772167][T24503] ? fib6_info_alloc+0x28/0x80 [ 3539.776929][T24503] __should_failslab+0x81/0x90 [ 3539.781688][T24503] should_failslab+0x5/0x20 [ 3539.786183][T24503] __kmalloc+0x66/0x340 [ 3539.790362][T24503] fib6_info_alloc+0x28/0x80 [ 3539.794974][T24503] ip6_route_info_create+0x388/0xc80 [ 3539.800262][T24503] ? __kfree_skb+0xfe/0x150 [ 3539.804767][T24503] ? kfree+0xf0/0x1d0 [ 3539.808744][T24503] ip6_route_add+0x22/0x100 [ 3539.813243][T24503] addrconf_notify+0xa44/0x1c50 [ 3539.818132][T24503] ? netlink_broadcast_filtered+0xb71/0xb90 06:28:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000640003470bbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff0600000d010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x100000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x101000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3539.824070][T24503] raw_notifier_call_chain+0x53/0xb0 [ 3539.829429][T24503] __dev_notify_flags+0x1d3/0x3a0 [ 3539.834462][T24503] dev_change_flags+0xa2/0xc0 [ 3539.839163][T24503] do_setlink+0x785/0x2380 [ 3539.843678][T24503] ? __nla_validate_parse+0x10ed/0x17f0 [ 3539.849260][T24503] ? __nla_parse+0x3c/0x50 [ 3539.853677][T24503] rtnl_setlink+0x237/0x280 [ 3539.858177][T24503] ? rtnl_dump_ifinfo+0xc70/0xc70 [ 3539.863276][T24503] rtnetlink_rcv_msg+0x6f4/0x7a0 [ 3539.868217][T24503] ? put_dec_trunc8+0x10e/0x130 [ 3539.873206][T24503] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 3539.879019][T24503] ? __wake_up+0x8d/0xc0 [ 3539.883260][T24503] ? __d_rehash+0x125/0x180 [ 3539.887767][T24503] ? __d_add+0x3bf/0x490 [ 3539.892066][T24503] ? avc_has_perm_noaudit+0x19a/0x240 [ 3539.897440][T24503] ? rhashtable_jhash2+0x13a/0x1a0 [ 3539.902606][T24503] ? jhash+0x2b0/0x2b0 [ 3539.906725][T24503] netlink_rcv_skb+0x13e/0x240 [ 3539.911552][T24503] ? rtnetlink_bind+0x60/0x60 [ 3539.916278][T24503] rtnetlink_rcv+0x18/0x20 [ 3539.920717][T24503] netlink_unicast+0x5ec/0x6b0 06:28:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x300000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3539.925473][T24503] netlink_sendmsg+0x6f8/0x7c0 [ 3539.930308][T24503] sock_write_iter+0x1a4/0x200 [ 3539.935073][T24503] do_iter_readv_writev+0x2cb/0x360 [ 3539.940268][T24503] do_iter_write+0x112/0x4c0 [ 3539.944855][T24503] ? import_iovec+0x69/0x80 [ 3539.949349][T24503] do_writev+0x1e0/0x400 [ 3539.953612][T24503] ? __cond_resched+0x11/0x40 [ 3539.958282][T24503] ? perf_trace_sys_exit+0x4d/0x160 [ 3539.963494][T24503] ? fput+0x2d/0x130 [ 3539.967385][T24503] ? syscall_trace_enter+0x153/0x290 [ 3539.972670][T24503] __x64_sys_writev+0x41/0x50 06:28:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff0600000e010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3539.977341][T24503] do_syscall_64+0x4a/0x90 [ 3539.981759][T24503] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3539.987670][T24503] RIP: 0033:0x4665d9 [ 3539.991553][T24503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3540.011168][T24503] RSP: 002b:00007f2699d99188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 3540.019601][T24503] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 3540.027639][T24503] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000003 [ 3540.035604][T24503] RBP: 00007f2699d991d0 R08: 0000000000000000 R09: 0000000000000000 [ 3540.043582][T24503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3540.051538][T24503] R13: 00007ffe65f9281f R14: 00007f2699d99300 R15: 0000000000022000 [ 3540.062481][T24508] tmpfs: Unknown parameter './bus' 06:28:14 executing program 5 (fault-call:8 fault-nth:8): r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e0500000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ae340b7677a0e5bf5ff1b0816f3f6db1c000100000000000000495f0000001c00000006ad8e5e00000089da8d0f00"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@private1, 0x0, r3}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190011000600ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002c00034700bb65e1c3e4ffff0600c110010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x400000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:28:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000640003470cbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06007400010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:14 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xa000000, 0x12, r2, 0x0) 06:28:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000640003470dbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 3540.154504][T24543] FAULT_INJECTION: forcing a failure. [ 3540.154504][T24543] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3540.167791][T24543] CPU: 0 PID: 24543 Comm: syz-executor.5 Tainted: G W 5.13.0-rc7-syzkaller #0 [ 3540.177966][T24543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3540.188014][T24543] Call Trace: [ 3540.191287][T24543] dump_stack+0x137/0x19d [ 3540.195618][T24543] should_fail+0x23c/0x250 06:28:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000640003470ebb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 06:28:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000740)={0x1f000000, 0x0, 0x0, 0x0, {0x600000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3540.200035][T24543] should_fail_usercopy+0x16/0x20 [ 3