26.539757] Code: f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 626.539798] RSP: 002b:00007f87cc383098 EFLAGS: 00000293 ORIG_RAX: 0000000000000029 [ 626.539836] RAX: ffffffffffffffda RBX: 00007f87cef21f60 RCX: 00007f87cee10197 [ 626.539865] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 626.539892] RBP: 00007f87cc3841d0 R08: 0000000000000000 R09: 0000000000000000 [ 626.539918] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000020000100 [ 626.539945] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 626.539997] 07:17:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x4b49, &(0x7f0000000000)={'lo\x00'}) 07:18:16 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x0, 0x0) (fail_nth: 10) 07:18:16 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x28020080) 07:18:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4c042, 0x0) fallocate(r0, 0x0, 0x2, 0x120000) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000001480)=""/4111, 0x7ffff000}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4c042, 0x0) fallocate(r1, 0x0, 0x0, 0x120000) preadv(r1, &(0x7f0000001400)=[{&(0x7f0000001480)=""/4111, 0x7ffff000}], 0x1, 0x0, 0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r2, 0x5441, 0x7fff) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f0000000140)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 07:18:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4c042, 0x0) fallocate(r0, 0x0, 0x2, 0x120000) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000001480)=""/4111, 0x7ffff000}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4c042, 0x0) fallocate(r1, 0x0, 0x0, 0x120000) preadv(r1, &(0x7f0000001400)=[{&(0x7f0000001480)=""/4111, 0x7ffff000}], 0x1, 0x0, 0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r2, 0x5441, 0x7fff) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f0000000140)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 07:18:16 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') r1 = fcntl$dupfd(r0, 0x0, r0) setns(r1, 0x20000000) 07:18:16 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x541b, &(0x7f0000000000)={'lo\x00'}) 07:18:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:18:16 executing program 0: unshare(0x20000200) unshare(0x28020080) [ 647.367862] FAULT_INJECTION: forcing a failure. [ 647.367862] name failslab, interval 1, probability 0, space 0, times 0 [ 647.369821] CPU: 1 UID: 0 PID: 8197 Comm: syz-executor.6 Not tainted 6.13.0-rc3-next-20241218 #1 [ 647.369917] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 647.369962] Call Trace: [ 647.369982] [ 647.370009] dump_stack_lvl+0xfa/0x120 [ 647.370097] should_fail_ex+0x4d7/0x5e0 [ 647.370219] ? alloc_empty_file+0x76/0x1e0 [ 647.370307] should_failslab+0xc2/0x120 [ 647.370453] kmem_cache_alloc_noprof+0x60/0x3d0 [ 647.370603] alloc_empty_file+0x76/0x1e0 [ 647.370704] alloc_file_pseudo+0x139/0x200 [ 647.370811] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 647.370903] ? srso_return_thunk+0x5/0x5f [ 647.370992] ? srso_return_thunk+0x5/0x5f [ 647.371078] ? alloc_fd+0x2c0/0x560 [ 647.371213] sock_alloc_file+0x53/0x1d0 [ 647.371302] __sys_socket+0x1bc/0x260 [ 647.371413] ? __pfx___sys_socket+0x10/0x10 [ 647.371518] ? ksys_write+0x1b1/0x240 [ 647.371644] ? __pfx_ksys_write+0x10/0x10 [ 647.371796] __x64_sys_socket+0x73/0xb0 [ 647.371909] do_syscall_64+0xbf/0x1d0 [ 647.372007] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 647.372109] RIP: 0033:0x7f87cee10197 [ 647.372164] Code: f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 647.372244] RSP: 002b:00007f87cc383098 EFLAGS: 00000293 ORIG_RAX: 0000000000000029 [ 647.372319] RAX: ffffffffffffffda RBX: 00007f87cef21f60 RCX: 00007f87cee10197 [ 647.372376] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 647.372428] RBP: 00007f87cc3841d0 R08: 0000000000000000 R09: 0000000000000000 [ 647.372481] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000020000100 [ 647.372534] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 647.372641] 07:18:16 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x0, 0x0) (fail_nth: 11) 07:18:16 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5421, &(0x7f0000000000)={'lo\x00'}) [ 647.625313] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 647.732992] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 07:18:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5450, &(0x7f0000000000)={'lo\x00'}) 07:18:33 executing program 3: prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0xc0ed0000, 0x0) 07:18:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:18:33 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:18:33 executing program 5: r0 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x1208010, &(0x7f0000000840)=ANY=[]) symlinkat(&(0x7f00000003c0)='./file1\x00', r0, &(0x7f0000000440)='./file0\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000003ac0)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0xee00, r1, 0x0) statx(r0, &(0x7f0000001ac0)='./file0\x00', 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r2, &(0x7f0000003080)=[{{&(0x7f0000001b40)={0xa, 0x4e20, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4008805) 07:18:33 executing program 7: unshare(0x20000200) unshare(0x28020080) 07:18:33 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x0, 0x0) (fail_nth: 12) 07:18:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:18:33 executing program 7: unshare(0x20000200) unshare(0x28020080) 07:18:33 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) [ 664.723324] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 07:18:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5451, &(0x7f0000000000)={'lo\x00'}) 07:18:33 executing program 7: unshare(0x20000200) unshare(0x28020080) 07:18:33 executing program 5: syz_io_uring_setup(0x4041, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000340)={0x1f, {{0xa, 0x4e22, 0xbd2, @mcast1, 0x80}}, {{0xa, 0x4e22, 0xffffffff, @remote}}}, 0x108) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @remote}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000100)=0xa258, 0x4) sendmmsg$inet6(r0, &(0x7f00000035c0)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, 0x1c, &(0x7f0000000540)=[{&(0x7f0000000180)="b0", 0x1}], 0x1}}], 0x1, 0x4008000) 07:18:33 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x0, 0x0) (fail_nth: 13) 07:18:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000006200)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="a4", 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x9841) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x2c, 0x0, 0x4, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0xff}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x5e}]}, 0x2c}}, 0x14004004) socket$nl_generic(0x10, 0x3, 0x10) 07:18:33 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) [ 664.997881] FAULT_INJECTION: forcing a failure. [ 664.997881] name failslab, interval 1, probability 0, space 0, times 0 [ 665.000133] CPU: 0 UID: 0 PID: 8245 Comm: syz-executor.6 Not tainted 6.13.0-rc3-next-20241218 #1 [ 665.000229] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 665.000273] Call Trace: [ 665.000293] [ 665.000320] dump_stack_lvl+0xfa/0x120 [ 665.000415] should_fail_ex+0x4d7/0x5e0 [ 665.000535] ? security_file_alloc+0x35/0x130 [ 665.000657] should_failslab+0xc2/0x120 [ 665.000795] kmem_cache_alloc_noprof+0x60/0x3d0 [ 665.000915] ? srso_return_thunk+0x5/0x5f [ 665.000996] ? __create_object+0x59/0x80 [ 665.001108] security_file_alloc+0x35/0x130 [ 665.001236] init_file+0x95/0x480 [ 665.001326] alloc_empty_file+0x94/0x1e0 [ 665.001424] alloc_file_pseudo+0x139/0x200 [ 665.001520] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 665.001612] ? srso_return_thunk+0x5/0x5f [ 665.001699] ? srso_return_thunk+0x5/0x5f [ 665.001784] ? alloc_fd+0x2c0/0x560 [ 665.001916] sock_alloc_file+0x53/0x1d0 [ 665.002004] __sys_socket+0x1bc/0x260 [ 665.002113] ? __pfx___sys_socket+0x10/0x10 [ 665.002218] ? ksys_write+0x1b1/0x240 [ 665.002344] ? __pfx_ksys_write+0x10/0x10 [ 665.002467] ? srso_return_thunk+0x5/0x5f [ 665.002571] __x64_sys_socket+0x73/0xb0 [ 665.002683] do_syscall_64+0xbf/0x1d0 [ 665.002780] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 665.002882] RIP: 0033:0x7f87cee10197 [ 665.002937] Code: f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 665.003017] RSP: 002b:00007f87cc383098 EFLAGS: 00000293 ORIG_RAX: 0000000000000029 [ 665.003093] RAX: ffffffffffffffda RBX: 00007f87cef21f60 RCX: 00007f87cee10197 [ 665.003150] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 665.003202] RBP: 00007f87cc3841d0 R08: 0000000000000000 R09: 0000000000000000 [ 665.003255] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000020000100 [ 665.003308] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 665.003425] 07:18:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5452, &(0x7f0000000000)={'lo\x00'}) [ 665.086732] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:18:34 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x0, 0x0) (fail_nth: 14) 07:18:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000003000/0x2000)=nil) 07:18:54 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:18:54 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x0, 0x0) (fail_nth: 15) 07:18:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5460, &(0x7f0000000000)={'lo\x00'}) 07:18:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x1008001, &(0x7f0000013800)) open$dir(&(0x7f00000000c0)='./file0\x00', 0x20000, 0x20) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='system.advise\x00') 07:18:54 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000700)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x1ff) lseek(r2, 0x5, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/841], 0x48) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/vlan/vlan0\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x1ff) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000340)={0x2f, @private=0xa010102, 0x5e23, 0x4, 'wlc\x00', 0x17, 0xffffffff, 0x57}, 0x2c) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000140), &(0x7f0000000180)=0x4) perf_event_open(&(0x7f0000000b40)={0x4, 0x80, 0x80, 0x1, 0x6, 0x7, 0x0, 0xfffffffffffffffa, 0x80, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x1, @perf_config_ext={0x7ff, 0x7}, 0x148f4, 0x7d85, 0x3, 0x6, 0x6, 0x2779, 0x6, 0x0, 0x6, 0x0, 0xffffffffffffff6f}, 0x0, 0xf, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup/syz1\x00', 0x200002, 0x0) 07:18:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:18:54 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:18:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8901, &(0x7f0000000000)={'lo\x00'}) [ 685.659076] FAULT_INJECTION: forcing a failure. [ 685.659076] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 685.660592] loop4: detected capacity change from 0 to 4 [ 685.660601] CPU: 1 UID: 0 PID: 8277 Comm: syz-executor.6 Not tainted 6.13.0-rc3-next-20241218 #1 [ 685.660653] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 685.660676] Call Trace: [ 685.660687] [ 685.660701] dump_stack_lvl+0xfa/0x120 [ 685.660749] should_fail_ex+0x4d7/0x5e0 [ 685.660813] should_fail_alloc_page+0xe0/0x110 [ 685.660887] prepare_alloc_pages+0x178/0x500 [ 685.660945] __alloc_frozen_pages_noprof+0x180/0x1f90 [ 685.661007] ? srso_return_thunk+0x5/0x5f [ 685.661053] ? srso_return_thunk+0x5/0x5f [ 685.661093] ? hlock_class+0x4e/0x130 [ 685.661134] ? __pfx_mark_lock+0x10/0x10 [ 685.661185] ? srso_return_thunk+0x5/0x5f [ 685.661225] ? hlock_class+0x4e/0x130 [ 685.661268] ? srso_return_thunk+0x5/0x5f [ 685.661308] ? hlock_class+0x4e/0x130 [ 685.661345] ? srso_return_thunk+0x5/0x5f [ 685.661385] ? __lock_acquire+0xc97/0x4360 [ 685.661445] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 685.661529] ? __pfx___lock_acquire+0x10/0x10 [ 685.661581] ? __lock_acquire+0x17c5/0x4360 [ 685.661641] ? srso_return_thunk+0x5/0x5f [ 685.661681] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 685.661739] ? srso_return_thunk+0x5/0x5f [ 685.661779] ? policy_nodemask+0xeb/0x4e0 [ 685.661838] alloc_pages_mpol+0xee/0x330 [ 685.661890] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 685.661943] ? find_held_lock+0x2c/0x110 [ 685.661984] ? srso_return_thunk+0x5/0x5f [ 685.662024] ? get_vma_policy+0x241/0x350 [ 685.662087] vma_alloc_folio_noprof+0xea/0x410 [ 685.662147] ? __pfx_vma_alloc_folio_noprof+0x10/0x10 [ 685.662208] ? srso_return_thunk+0x5/0x5f [ 685.662248] ? ___pte_offset_map+0x176/0x370 [ 685.662307] __handle_mm_fault+0x14ee/0x2fa0 [ 685.662373] ? __pfx_lock_release+0x10/0x10 [ 685.662426] ? trace_lock_acquire+0x13b/0x1b0 [ 685.662468] ? srso_return_thunk+0x5/0x5f [ 685.662515] ? __pfx___handle_mm_fault+0x10/0x10 [ 685.662575] ? lock_acquire+0x32/0xc0 [ 685.662626] ? do_user_addr_fault+0x4aa/0xd50 [ 685.662714] handle_mm_fault+0x2b4/0x6a0 [ 685.662775] ? access_error+0x17d/0x380 [ 685.662824] do_user_addr_fault+0x4fa/0xd50 [ 685.662870] ? srso_return_thunk+0x5/0x5f [ 685.662918] exc_page_fault+0x9c/0x1a0 [ 685.662989] asm_exc_page_fault+0x26/0x30 [ 685.663039] RIP: 0033:0x7f87cedac858 [ 685.663068] Code: b9 0c 00 00 00 89 57 50 31 c9 89 d2 44 89 f7 4c 8d 44 24 14 c7 44 24 1c 00 00 00 00 48 c7 44 24 14 00 00 00 00 66 89 44 24 14 e3 4f 01 00 48 89 c6 8b 43 50 48 39 f0 74 48 40 84 ed 0f 85 79 [ 685.663109] RSP: 002b:00007f87cc383000 EFLAGS: 00010246 [ 685.663140] RAX: 0000000000000010 RBX: 00007f87cc3830f0 RCX: 0000000000000000 [ 685.663167] RDX: 0000000000000020 RSI: 00007f87cc383140 RDI: 0000000000000004 [ 685.663194] RBP: 0000000000000001 R08: 00007f87cc383014 R09: 000000000000000c [ 685.663220] R10: 00007f87cee68800 R11: 00007f87cee68801 R12: 00007f87cc383068 [ 685.663248] R13: 00007f87cc383140 R14: 0000000000000004 R15: 0000000000000000 [ 685.663302] [ 685.663591] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF 07:18:54 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:18:54 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x1a0000, &(0x7f00000005c0)) 07:18:54 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) [ 685.894975] loop4: detected capacity change from 0 to 4 [ 685.907930] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:18:54 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x0, 0x0) (fail_nth: 16) 07:18:54 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:18:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8902, &(0x7f0000000000)={'lo\x00'}) 07:18:54 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) socketpair(0x9, 0x6, 0x7ff, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4000) syz_open_procfs(0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r2, 0x5441, 0x7fff) pwritev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="920fe068eb53c1456ab130851f46dffbf773179bebcb455192b396e6", 0x1c}, {&(0x7f0000000180)="4431bd6c944adf178c", 0x9}], 0x2, 0x0, 0x1ff) [ 686.235951] FAULT_INJECTION: forcing a failure. [ 686.235951] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 686.237903] CPU: 0 UID: 0 PID: 8305 Comm: syz-executor.6 Not tainted 6.13.0-rc3-next-20241218 #1 [ 686.237992] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 686.238033] Call Trace: [ 686.238052] [ 686.238078] dump_stack_lvl+0xfa/0x120 [ 686.238160] should_fail_ex+0x4d7/0x5e0 [ 686.238275] _copy_from_user+0x30/0xd0 [ 686.238366] move_addr_to_kernel.part.0+0x31/0x110 [ 686.238481] __sys_sendto+0x1db/0x570 [ 686.238603] ? __pfx___sys_sendto+0x10/0x10 [ 686.238714] ? vma_end_read+0x23/0x260 [ 686.238807] ? find_held_lock+0x2c/0x110 [ 686.238882] ? vma_end_read+0xf7/0x260 [ 686.238953] ? srso_return_thunk+0x5/0x5f [ 686.239028] ? lock_release+0x20f/0x6f0 [ 686.239143] ? __pfx_lock_release+0x10/0x10 [ 686.239248] ? trace_lock_acquire+0x13b/0x1b0 [ 686.239340] ? srso_return_thunk+0x5/0x5f [ 686.239415] ? lock_acquire+0x32/0xc0 [ 686.239511] ? vma_end_read+0x23/0x260 [ 686.239622] __x64_sys_sendto+0xe1/0x1c0 [ 686.239736] ? srso_return_thunk+0x5/0x5f [ 686.239810] ? lockdep_hardirqs_on_prepare+0x262/0x3f0 [ 686.239922] do_syscall_64+0xbf/0x1d0 [ 686.240012] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 686.240123] RIP: 0033:0x7f87cedc18ac 07:18:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) [ 686.240174] Code: fa fa ff ff 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 20 fb ff ff 48 8b [ 686.240248] RSP: 002b:00007f87cc382fc0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 686.240319] RAX: ffffffffffffffda RBX: 00007f87cc3830f0 RCX: 00007f87cedc18ac [ 686.240372] RDX: 0000000000000020 RSI: 00007f87cc383140 RDI: 0000000000000004 [ 686.240422] RBP: 0000000000000000 R08: 00007f87cc383014 R09: 000000000000000c [ 686.240471] R10: 0000000000000000 R11: 0000000000000293 R12: 00007f87cc383068 [ 686.240521] R13: 00007f87cc383140 R14: 0000000000000004 R15: 0000000000000000 [ 686.240617] 07:18:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) r1 = syz_io_uring_complete(0x0) ioctl$HIDIOCGRAWNAME(r1, 0x80404804, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d02"], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 07:19:15 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe427, 0x9}, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x1000004, 0x813, r0, 0x0) fsmount(r0, 0x1, 0x80) write(r0, &(0x7f0000000200)='E', 0x140000) 07:19:15 executing program 7: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:19:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000700)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x1ff) lseek(r2, 0x5, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="26909b126ce294868cae38ed48a0ff000007000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a2000000000000c700907ffda30008000000000000010000000017339d754195234c1810d6342740fec310b235bd480ecc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a088fd538012994fe736f43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd34e09472b7846c4e6e74f3f5491dfda8000023d80480178ca30700000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931000000000000000022878bbe54fa23f1b44dcfeb7eba71797cba518157b607000000000000004d07182fcd4e653bdb266a1c643d8cfdab10a1408a26292ec10000000000015f164fcc37add0ad903e4947a1c32dc0587160f886a90b779a00000800000000000002000d572c0000a6ded8aeeda9320e8e1cab000022183ba452f48179248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521bc676c5a7944006b5389b56b0ce3effa3473ce5d0c77655664260feed097ab9bfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f592a797f5503b38957f62d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73292e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a297813f579b7f24a34d5ee4d0e3738e6eba41ce70153f010000000000000029a5a9f972cc49fcf88c68b5f14a0dcc36547240e8393862b8ffc0aad8e4bbfb26ac5617b9cc24c8a904071533c8d420930829967a972469e38048b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f50000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000094193ada230d2c2161576d1269a8b9dc049300"/841], 0x48) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/vlan/vlan0\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x1ff) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000340)={0x2f, @private=0xa010102, 0x5e23, 0x4, 'wlc\x00', 0x17, 0xffffffff, 0x57}, 0x2c) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000140), &(0x7f0000000180)=0x4) perf_event_open(&(0x7f0000000b40)={0x4, 0x80, 0x80, 0x1, 0x6, 0x7, 0x0, 0xfffffffffffffffa, 0x80, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x1, @perf_config_ext={0x7ff, 0x7}, 0x148f4, 0x7d85, 0x3, 0x6, 0x6, 0x2779, 0x6, 0x0, 0x6, 0x0, 0xffffffffffffff6f}, 0x0, 0xf, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup/syz1\x00', 0x200002, 0x0) 07:19:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000700)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x1ff) lseek(r2, 0x5, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/841], 0x48) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/vlan/vlan0\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x1ff) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000340)={0x2f, @private=0xa010102, 0x5e23, 0x4, 'wlc\x00', 0x17, 0xffffffff, 0x57}, 0x2c) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000140), &(0x7f0000000180)=0x4) perf_event_open(&(0x7f0000000b40)={0x4, 0x80, 0x80, 0x1, 0x6, 0x7, 0x0, 0xfffffffffffffffa, 0x80, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x1, @perf_config_ext={0x7ff, 0x7}, 0x148f4, 0x7d85, 0x3, 0x6, 0x6, 0x2779, 0x6, 0x0, 0x6, 0x0, 0xffffffffffffff6f}, 0x0, 0xf, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup/syz1\x00', 0x200002, 0x0) 07:19:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8903, &(0x7f0000000000)={'lo\x00'}) 07:19:15 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x0, 0x0) 07:19:15 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:19:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) [ 706.956042] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:19:15 executing program 7: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:19:15 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:19:15 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x2, 0x0) 07:19:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8904, &(0x7f0000000000)={'lo\x00'}) 07:19:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000700)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x1ff) lseek(r2, 0x5, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/841], 0x48) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/vlan/vlan0\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x1ff) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000340)={0x2f, @private=0xa010102, 0x5e23, 0x4, 'wlc\x00', 0x17, 0xffffffff, 0x57}, 0x2c) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000140), &(0x7f0000000180)=0x4) perf_event_open(&(0x7f0000000b40)={0x4, 0x80, 0x80, 0x1, 0x6, 0x7, 0x0, 0xfffffffffffffffa, 0x80, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x1, @perf_config_ext={0x7ff, 0x7}, 0x148f4, 0x7d85, 0x3, 0x6, 0x6, 0x2779, 0x6, 0x0, 0x6, 0x0, 0xffffffffffffff6f}, 0x0, 0xf, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup/syz1\x00', 0x200002, 0x0) 07:19:16 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x3, 0x0) 07:19:16 executing program 7: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:19:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:19:50 executing program 4: rt_sigaction(0x18, &(0x7f0000000080)={&(0x7f0000000000)="2e67660fdfc9c4237148b00000000069c4225100d8c442a19394bf03000000f2adc4e1ade436c4c3f10f88a11dad1f5fc442110b3fdefe420f1f00", 0x0, &(0x7f0000000040)="f3436cc421d9fbb0724bce2e8f09e09758006540d21766a2000000000080000065660f5a9d010000000f6ba59eb800002e532666470ff84ae9f01117"}, &(0x7f0000000140)={&(0x7f00000000c0)="0fc709260fa866470f38f6e3440ffdddc4a2b902908346a8a5f3470fd6cdc4c1795bdf410f38c8c526f0462897030000008fc978e118", 0x0, &(0x7f0000000100)="64470f0d2fc44209afa516bb0efbc4411dd843030f0dde660f5d2e47f6a957a5288ec463797d010d450f80ef000000c4e3f9166fc0fef20f10cf"}, 0x8, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000280)={0x0}) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x5, 0x0, 0x2, 0xcb, 0x9, 0x1}, &(0x7f0000000200)={0x6, 0x4, 0x6, 0x3, 0x92, 0x9, 0x8c}, 0x0, &(0x7f00000002c0)={r0}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000380)={[0x40]}, &(0x7f00000003c0), 0x8) pselect6(0x40, &(0x7f0000000400)={0x3ff, 0x5, 0x95e, 0x43, 0x0, 0xd37e, 0x74d}, &(0x7f0000000440)={0x0, 0x4e50, 0x0, 0xffffffffffff5609, 0x3, 0x9, 0x9bf1, 0x2}, &(0x7f0000000480)={0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x36a, 0x4}, &(0x7f00000004c0), &(0x7f0000000540)={&(0x7f0000000500)={[0xfffffffffffffff7]}, 0x8}) connect$packet(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000780)) rt_sigaction(0x12, &(0x7f00000008c0)={0x0, 0x40000003, 0x0, {[0x4]}}, 0x0, 0x8, &(0x7f0000000900)) rt_sigprocmask(0x2, &(0x7f0000000940)={[0x9b]}, 0x0, 0x8) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000009c0)='.dead\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000a40)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xbda2bcf}}, './file0\x00'}) r1 = request_key(&(0x7f0000000c00)='id_resolver\x00', &(0x7f0000000c40)={'syz', 0x3}, &(0x7f0000000c80)='builtin_and_secondary_trusted\x00', 0xfffffffffffffffe) keyctl$search(0xa, 0x0, 0x0, 0x0, r1) pselect6(0x40, &(0x7f0000000d00)={0xb0, 0x0, 0x0, 0x80000001, 0x2, 0x4d4bec3c, 0x0, 0x2}, &(0x7f0000000d40)={0x80000000, 0x7, 0x8, 0x0, 0x6, 0x1, 0x0, 0xffff}, &(0x7f0000000d80)={0x2, 0x38000, 0xf2, 0x7fff, 0x6, 0x5, 0x400, 0x100}, &(0x7f0000000e00), 0x0) 07:19:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8906, &(0x7f0000000000)={'lo\x00'}) 07:19:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000700)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x1ff) lseek(r2, 0x5, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/841], 0x48) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/vlan/vlan0\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x1ff) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000340)={0x2f, @private=0xa010102, 0x5e23, 0x4, 'wlc\x00', 0x17, 0xffffffff, 0x57}, 0x2c) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000140), &(0x7f0000000180)=0x4) perf_event_open(&(0x7f0000000b40)={0x4, 0x80, 0x80, 0x1, 0x6, 0x7, 0x0, 0xfffffffffffffffa, 0x80, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x1, @perf_config_ext={0x7ff, 0x7}, 0x148f4, 0x7d85, 0x3, 0x6, 0x6, 0x2779, 0x6, 0x0, 0x6, 0x0, 0xffffffffffffff6f}, 0x0, 0xf, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup/syz1\x00', 0x200002, 0x0) 07:19:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:19:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001140)=""/4094, 0xffe) 07:19:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:19:50 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x4, 0x0) 07:19:50 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x28020080) [ 741.667332] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:19:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:19:50 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x28020080) 07:19:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8907, &(0x7f0000000000)={'lo\x00'}) 07:19:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:19:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100040, 0x0) stat(&(0x7f0000001480)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) acct(0x0) setresuid(0x0, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0\x00', 0x40) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/file0\x00') 07:19:50 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x5, 0x0) 07:19:50 executing program 3: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f00000000c0)={0x2, 0x201, 0x6, 0x5, 0x7, 0x3f}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000, 0xd, &(0x7f0000000200)=[{&(0x7f0000000040)="601c6d6b646f7366f6259d00080120000400004000f80000200040000300000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010100)='RRaA\x00'/32, 0x20, 0x800}, {&(0x7f0000010200)="0000000072724161120000000b000000000000000000000000000000000055aa", 0x20, 0x9e0}, {&(0x7f0000010300)="601c6d6b646f7366f6259d00080120000400004000f80000200040000300000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60, 0x3000}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0f0700000008000000090000000a000000ffffff0fffffff0f00"/64, 0x40, 0x10000}, {&(0x7f0000010500)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0f0700000008000000090000000a000000ffffff0fffffff0f00"/64, 0x40, 0x10800}, {&(0x7f0000010600)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0f0700000008000000090000000a000000ffffff0fffffff0f00"/64, 0x40, 0x11000}, {&(0x7f0000010700)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0f0700000008000000090000000a000000ffffff0fffffff0f00"/64, 0x40, 0x11800}, {&(0x7f0000010800)="53595a4b414c4c45522020080000ea80325132510000ea80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202010005aeb70325132510000eb70325103000000000041660069006c00650031000f00100000ffffffffffffffffffff0000ffffffff46494c453120202020202020005aeb70325132510000eb70325105000a00000041660069006c00650032000f00140000ffffffffffffffffffff0000ffffffff46494c453220202020202020005aeb70325132510000eb70325106002823000041660069006c0065002e000f00d263006f006c0064000000ffff0000ffffffff46494c457e312020434f4c20005aeb70325132510000eb7032510b0064000000", 0x120, 0x12000}, {&(0x7f0000010a00)="2e2020202020202020202010005aeb70325132510000eb7032510300000000002e2e20202020202020202010005aeb70325132510000eb70325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202020005aeb70325132510000eb70325104001a040000", 0x80}, {&(0x7f0000010b00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x13000}, {&(0x7f0000011000)='syzkallers\x00'/32, 0x20, 0x13800}, {&(0x7f0000011100)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x16800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="92461ec95a1c6600"]) 07:19:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001140)=""/4094, 0xffe) 07:19:50 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1200019, 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0xfff) vmsplice(r0, &(0x7f0000000280)=[{&(0x7f0000000180)="a65bf79aa294d6824f47a3f3d3ee0b6fa4d426d2da578d583a1c1b3e72cb3089ce89e9e3ad57c88d416fe164f059c1b1ad820d9de571b084e192942541d748caf5a9b0e1d52e390eef69cfc4d9c6ef3db8455e2d57ffaea7dba092d7d0b4eb2cbf5e43dbb195cbbad659bba9cfb0395cb29c2bd7c0c871ef72998b12d5fbe4327cc5356098c0e35646578a2081bb5f9609fb3729abe7a45dd0c516066c10a59793e520fbc9fc813f90c853ac48ad932208ae9043ae08ea54d0cf5cd9a2de8622e964329bced4d869", 0xc8}, {&(0x7f00000000c0)="f6944087b60fca", 0x7}, {&(0x7f0000000100)="e5038442a397e23d4113088f1a", 0xd}], 0x3, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000140)=@v2={0x2000000, [{0x2000000}]}, 0x14, 0x0) setxattr$incfs_metadata(&(0x7f00000018c0)='./file0\x00', &(0x7f0000001900), &(0x7f0000001a40)="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", 0xf8d, 0x0) 07:19:50 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x28020080) [ 742.221687] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:19:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x7fff) syz_emit_ethernet(0x68, &(0x7f00000005c0)=ANY=[@ANYBLOB="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", @ANYBLOB="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", @ANYRES64, @ANYRESOCT, @ANYRESHEX, @ANYRES32, @ANYRESHEX, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="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"], 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$TIOCGPTPEER(r2, 0x5441, 0x406) 07:19:51 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x6, 0x0) 07:19:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890b, &(0x7f0000000000)={'lo\x00'}) 07:20:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890c, &(0x7f0000000000)={'lo\x00'}) 07:20:11 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:20:11 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001140)=""/4094, 0xffe) 07:20:11 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x0) 07:20:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r1 = inotify_init1(0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000500)=""/31) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x1c0) utimensat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{0x0, 0x2710}}, 0x0) dup2(r2, r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = add_key$keyring(&(0x7f0000000680), &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x400, 0x80, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(r2, &(0x7f0000000440)='./file0\x00', 0x4000, 0x0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r4, r5, r6) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x6, 0x2, &(0x7f00000001c0)=[{&(0x7f00000014c0)="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", 0x1000, 0x6}, {&(0x7f0000000340)="f2a031785865e41246293118708fe82082bbd91bc620cc243ff744eafc546ad98ab6938bd8f741921b3a916f45769a605c99a8bf9aa75b2d49900df018f31a36c32da2ed72ccc856e514a84b0c6df05b1f75cb8357d94927decd4eea6c8ff3311f8c884eeef5dcf899fdc943844f1537632a2a4fddb927ab5b923270a66c7bbcb615c508245c74dfd0b45e0704c5643bac8198fd69a728da3bbf4ce8539b5dcb3f6dc619dbc1e528ece7c217205b971525efabdd2e0a26c01965beb654b58ec29989d3859cb636ca48b22a4fa7", 0xcd, 0xfff}], 0x80000, &(0x7f0000000540)=ANY=[@ANYBLOB='huge=within_size,euid>', @ANYRESDEC=r5, @ANYBLOB="ff033d000016535a3973d722803524d118d1b04afde9ac506261", @ANYRESDEC=0xee01, @ANYBLOB=',qubj_type={\')[%(,smackfsroot=ysedm_u,\x00'/51]) sendmsg$netlink(r3, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000010c0)={0x2c, 0x10, 0x1, 0x0, 0x0, "", [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x2}, @typed={0x4, 0x0, 0x0, 0x0, @binary}, @nested={0xc, 0x4, 0x0, 0x1, [@typed={0x8, 0x17, 0x0, 0x0, @pid}]}]}, 0x2c}], 0x1}, 0x0) pidfd_getfd(r2, r3, 0x0) dup2(r1, r0) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x108000, 0xd0) 07:20:11 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x7, 0x0) 07:20:11 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = getuid() syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xfffffffffffff801, 0x2, &(0x7f0000000140)=[{&(0x7f0000000240)="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", 0x1000, 0x200000000}, {&(0x7f0000000100)="b61a2b8c2978832880cdc8c6588b4b1adba101054546ff04b86c381e1f4c5dbacf", 0x21, 0x400}], 0x8, &(0x7f0000001240)={[{@nr_blocks={'nr_blocks', 0x3d, [0x31, 0x36, 0x70, 0x38, 0x78]}}, {@size={'size', 0x3d, [0x38, 0x74, 0x31, 0x3a, 0x25]}}], [{@pcr={'pcr', 0x3d, 0x16}}, {@fowner_gt={'fowner>', 0xee01}}, {@measure}, {@dont_appraise}, {@uid_gt={'uid>', r1}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'system.posix_acl_access\x00'}}, {@dont_hash}]}) removexattr(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)=@known='system.posix_acl_access\x00') ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x50b}}, './file1\x00'}) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001300)={{{@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, @in6=@ipv4={'\x00', '\xff\xff', @local}, 0x4e22, 0x7, 0x4e24, 0x1ff, 0xa, 0x20, 0x0, 0x67, 0x0, r1}, {0x0, 0x0, 0x7f, 0x100, 0x2, 0x20, 0xfffffffffffffff9, 0x4}, {0x400, 0xd9, 0x1ff, 0x7a}, 0x2, 0x6e6bb7, 0x1, 0x1, 0x3, 0x3}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4d5, 0x6c}, 0xa, @in6=@mcast2, 0x3504, 0x4, 0x2, 0x9, 0x2, 0x800, 0x1}}, 0xe8) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r3, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) getpeername$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @initdev}, &(0x7f0000001400)=0x10) 07:20:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() r3 = getgid() setresgid(r2, r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r4, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) r5 = getpid() pidfd_open(r5, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x3, 0x0, 0x0, 0x7ff}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) newfstatat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r6, 0x0) r7 = syz_open_dev$vcsu(&(0x7f0000000240), 0x6, 0x40) r8 = syz_open_dev$tty1(0xc, 0x4, 0x4) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r9, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r9, 0x5441, 0x7fff) sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)={0x1c, 0x25, 0x100, 0x70bd25, 0x25dfdbfb, "", [@typed={0x8, 0x9, 0x0, 0x0, @u32=0x664}, @nested={0x4, 0x93}]}, 0x1c}, {&(0x7f00000014c0)={0x2384, 0x3b, 0x4, 0x70bd2d, 0x25dfdbff, "", [@typed={0x14, 0x56, 0x0, 0x0, @ipv6=@empty}, @nested={0x44, 0x31, 0x0, 0x1, [@typed={0x4, 0x1b}, @generic="4d63eb682b914cdfbb7e26b094a80aef6acb74a286998b715517cbc34f729b8a8bf8ec1cf21bfa1c6b1bc77e025371ce00a040a71938c8f5c684473b"]}, @generic="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", @typed={0x14, 0x44, 0x0, 0x0, @ipv6=@mcast1}, @nested={0x1b8, 0x4f, 0x0, 0x1, [@typed={0xc, 0x39, 0x0, 0x0, @u64=0x45}, @generic="34da68698c473016ecbefc68a19a2d5c507ccf2ba5c370ca3181ec8831aa2220c3746b3fe595f0e54feb515073bc0a7b6efdce04c207a4116025ecc7a33729619a43534bbbb70655be1162ef523b0a76eca3e6069224084fe048989b9b676fe9e269679ddc095c690db3a3e0ad610dcb0e910cfabbe0042bf0d9306a207981d883e39bba41deac5bb903f7765c7e8f2e8a83c15dae239a51bd18b94216295398a8e3e18cfd41c70586c523738a3c2a36ebcee4683fa8522802dcbc7d3ef52cb11a0430051fc82b0de9c985d11a3af8eee5621f5f99a3e064cd27f859d4a5c0f524ad0dc1", @generic="6f2c9a1f76eb2faf3bc311e6313c53d7121aaadbd75ad5530b35a31ed7c52dd46bdc8e176e8d681066d39835433eb6f8494c16c78d3d30c0f1e2f7bb73ade98212e8f6cbb30f7b7f80fa7fc0b9b3c479b3ccc88356dc39d463f080a677d4c411a6e473a7dc17abd6af0fbcf6ec798db8c9eeba82ef6a9fd601ee24c10ce3b42fd091cddfc6543d4303416ef096fa67675d4e2c7a374b8bdb236386f986995c7132182f2cc3d1f374b16f13acdac848cc57c80ab9299b0ea1a98b17ed", @typed={0x5, 0x55, 0x0, 0x0, @str='\x00'}]}, @generic="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", @typed={0x8, 0x14, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x3f}}, @nested={0x145, 0x48, 0x0, 0x1, [@typed={0x14, 0x18, 0x0, 0x0, @ipv6=@local}, @typed={0x8, 0x4f, 0x0, 0x0, @uid=0xffffffffffffffff}, @typed={0x8, 0x14, 0x0, 0x0, @uid}, @typed={0x2c, 0x4d, 0x0, 0x0, @binary="6aba1b2917939395e7fa128aac5928dedbd66b2159f4ae858b2631f62282bad03fd5306e1e69ca54"}, @generic="555ec350f410d89021046d3a2d6be52e7df745f3781c58b93aed08874c150cd5f634ba7aa2365dd4c819250d8930277e4ef79d1f9284f2c8dcec4e4e7aeeee3c90a8ec525bdc4c384b28d338c1c6e8152a43a9677d092f0442ec6788e19c7b8a076fb0d070a48bbb358263a52768a19fc69b909d7831301809fd6357371d6c6a987807b18535cccc3b8ddeba187f9c10e5b0c9c1f57781f554ed59e1dcf68476c09dde687a35d0d440c71802ef76e9b1182776acd06ec8b7817108c139d86e5ebce9a1881735f9ff7c247351b0cb81c4d329f6d8368fccfdf04dba3f23931f635b34181261442d45241e525ae9e633da03"]}]}, 0x2384}, {&(0x7f0000005c40)=ANY=[@ANYBLOB="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"], 0x1010}, {&(0x7f00000048c0)={0x136c, 0x16, 0x200, 0x70bd2c, 0x25dfdbfd, "", [@nested={0x229, 0x37, 0x0, 0x1, [@typed={0x5, 0x66, 0x0, 0x0, @str='\x00'}, @generic="e3cded874a5f38c8d9f6f703e126aaeec53d3b47da9eeab5db4e0ab4d63b2bca19942abc736ecf04048115549e9011580eda49de9095f9dfa2bac710146f8614ca4332d66cacb9343a954ca5275b0fd1ebd5bbd6cda53cf67037336ac0b2647d62fad54d21d0591162b2b243d07f6ac2cdfdfc14d4fab900b69f9595af15b6b90890f9fd03cb832b884ebeea0063cb2bb51c2405c85f914150f60aafa24d665e96933625fb4ef6da8457b0e4e935e7233ff7d12fece9540a22808c7e668c9b59fab7c25ee6df2b1861e9f358420d8776fc0940ca7a8ceae909f04ded4b8e18427219bbdbd5151c3726368be3fdb49a6f182cde9639", @typed={0x8, 0x94, 0x0, 0x0, @fd=r0}, @typed={0x4, 0x68}, @typed={0x8, 0x8c, 0x0, 0x0, @pid}, @generic="4c78eb73870eaa3684bbec09e62515654aea07c6e04a684a62a3ce534ee0372d20c5ab62509d217c1fe6ca94725b670e1876661f4b9b1d0ede0ef4c1eb39499b7d2983f9620977de55bcd2", @generic="2e7aabcfd8b863a2d25d624776f91f69e9781e619187fe7588e387074aeeff92c1dce4df08417fafa1859d71d19f4f7bbb23423ef926c5fd76bebb72aa6977fbf19e1ee85a1be7349c137224140ea34e8aea3132d622a41346c055d88a1b1debf456cc6673ea7344a4c32b0458f533654515369a613db5c430a86b16dde6d6a25e36b29562629b15ce58e97a6216f65fe1c526db3b2f982567ae2318da7d5cebfa38ba478d595b927c6dc7076a6de29e9a00580415", @typed={0x14, 0x31, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}}]}, @typed={0x4, 0x3}, @typed={0x5, 0x41, 0x0, 0x0, @str='\x00'}, @generic="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", @generic="68dd94f4844c91abb97ffcfd49304b4a5e821fd33d3effa8d20e4535a88d8d6e18527bd1f248003422d325b61d745d50afc4725dd7cea5e21fda2f63d07f5dffc32f4cad912e760bf0487d47c27460330086655cee0e84792c4834a4fb394941cef5adbd2490ca3b6a2b44d06bb5a2cf4eed2ca16d49a74d5e1e2e9ab8cb198f9d45c33501e1e11bc8b1edd79b5c8074d5", @generic="fb4b39cc66377bac8554b2816ae80778231512a6b41d7f4539a659cf5af7cfa80a20649e49f64934cf32ea0ff51fc865479f7f333a61a9837999c7783fa602c900b3e1fb0da75c077b3f8a8ba0472606de4bc1672ca6924a2136230e95660b261009fe10e0702a337640f22ad5184b0128225d993c6a8ff18f4d5b3408a8d5fa821a22df2639f140c57804bbdee4aab818"]}, 0x136c}, {&(0x7f00000000c0)={0x10, 0x37, 0x100, 0x70bd26, 0x25dfdbfd}, 0x10}, {&(0x7f0000000100)={0x2c, 0x3c, 0x1, 0x70bd27, 0x25dfdbfc, "", [@nested={0x8, 0x5d, 0x0, 0x1, [@typed={0x4, 0x1d}]}, @typed={0x12, 0x51, 0x0, 0x0, @str='\xe0-\',(\x1c[\xd8/\\\':&\x00'}]}, 0x2c}], 0x6, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, r1, r3}}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r4]}}, @cred={{0x1c, 0x1, 0x2, {r5, r6}}}, @rights={{0x24, 0x1, 0x1, [r7, r8, 0xffffffffffffffff, r9, r0]}}], 0x88, 0x8010}, 0x4000040) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000280)=ANY=[@ANYBLOB="140000000082001eb93590d6fe0b390080000000"], 0x14}], 0x1}, 0x0) [ 762.808178] loop5: detected capacity change from 0 to 264192 [ 762.809257] tmpfs: Bad value for 'nr_blocks' [ 762.840277] loop5: detected capacity change from 0 to 264192 [ 762.848203] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=33280 sclass=netlink_route_socket pid=8434 comm=syz-executor.3 [ 762.852230] tmpfs: Bad value for 'nr_blocks' [ 762.891795] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 762.985525] loop4: detected capacity change from 0 to 15 [ 762.995896] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 07:20:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890d, &(0x7f0000000000)={'lo\x00'}) [ 763.187713] loop4: detected capacity change from 0 to 15 [ 763.199140] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 07:20:32 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x28020080) 07:20:32 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x8, 0x0) 07:20:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x0) 07:20:32 executing program 3: mount$9p_unix(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000200)='./file0/file0\x00', 0x0, 0x16202c, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xca) move_mount(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', r0, &(0x7f0000000340)='./file0/file0\x00', 0x20) clock_gettime(0x0, &(0x7f00000023c0)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000002280)=[{{&(0x7f0000000380), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000400)=""/82, 0x52}], 0x1, &(0x7f0000000480)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f0000000540), 0x6e, &(0x7f00000007c0)=[{&(0x7f00000005c0)=""/243, 0xf3}, {&(0x7f00000006c0)=""/243, 0xf3}], 0x2}}, {{&(0x7f0000000800), 0x6e, &(0x7f0000000a40)=[{&(0x7f0000000880)}, {&(0x7f00000008c0)=""/132, 0x84}, {&(0x7f0000000980)=""/169, 0xa9}], 0x3, &(0x7f0000000a80)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xf0}}, {{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000b80)=""/4096, 0x1000}], 0x1, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}}, {{&(0x7f0000001c80)=@abs, 0x6e, &(0x7f0000002100)=[{&(0x7f0000001d00)=""/173, 0xad}, {&(0x7f0000001dc0)=""/113, 0x71}, {&(0x7f0000001e40)=""/118, 0x76}, {&(0x7f0000001ec0)=""/89, 0x59}, {&(0x7f0000001f40)=""/172, 0xac}, {&(0x7f0000002000)=""/217, 0xd9}], 0x6, &(0x7f0000002180)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe0}}], 0x5, 0x0, &(0x7f0000002400)={r1, r2+10000000}) r24 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000002440)='./binderfs/binder-control\x00', 0x802, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r9, 0x7, r24, &(0x7f0000002480)={r0, r0, 0x7}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r7, 0xc0189377, &(0x7f0000004f40)={{0x1, 0x1, 0x18, r15, {0x9, 0x40000000}}, './file1\x00'}) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r26, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r27, 0x0) getresuid(&(0x7f0000006340)=0x0, &(0x7f0000006380), &(0x7f00000063c0)) getresgid(&(0x7f0000006980), &(0x7f00000069c0)=0x0, &(0x7f0000006a00)) r30 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r31 = accept$inet6(r22, 0x0, &(0x7f0000006a40)) sendmsg$netlink(r23, &(0x7f0000006b00)={&(0x7f0000002540)=@proc={0x10, 0x0, 0x25dfdbfe, 0x40}, 0xc, &(0x7f0000006900)=[{&(0x7f0000002580)={0xcc, 0x3b, 0x800, 0x70bd2b, 0x25dfdbfd, "", [@generic="f03a84e9b75f1f90f19bfe0cbea4dff7e236b2ad28a94e377226c62fba9b1e56615dd95ac4c4c7ec9267ff0a3cedee7f32cdf62e042c551a485dac813a929fbcc7239839b0dcd685ad755875e79928a114b17f992d9795dbf604a778a4e6a0318801ddd9cb231497ce72d62399e106b166d8621de891541de12f336315de49d7ee31b4b15a801fa137f72770aa9a38fdc8b0d959ba084af7e9484f9d4f82f0ded5a4319900e42cd414ad78c4c21e4d2009bfef32700fcb720a"]}, 0xcc}, {&(0x7f0000002680)={0x10, 0x24, 0x8, 0x70bd29, 0x25dfdbff}, 0x10}, {&(0x7f00000026c0)={0x14c, 0x39, 0x4, 0x70bd2b, 0x25dfdbff, "", [@nested={0x110, 0x78, 0x0, 0x1, [@typed={0x5, 0x79, 0x0, 0x0, @str='\x00'}, @typed={0x1e, 0x11, 0x0, 0x0, @str='./binderfs/binder-control\x00'}, @generic="deaa7153286168651c63223067d49a6119316e9cfa3a719962a8aab5fe7a50764c184220162eace65c436387", @generic="d31a73c52cc2b6ddafff", @generic="30d65590226b8fa3432534108354e7e1c070498f13c9b885de7840cf4aa0065afb8adc904136d1a4e13ec681e4d2281bb650482a7ea848e42715a51eccd0519d2a1c01e55bb3cef0d43592e0af03332233e1536e69cd8a7e832652540c6fb6ce3b5646b9c2af736d3d7fd30ddb524055c502728407c99d51600cbc6ccea04967d4a6cfa460d6a7dbc12a1a0b88c447b4250a55f9fedca052c6831ffe4a0b22595d01a02ee90a341e7eeb8e291bc6"]}, @generic="7526751d746443fd70acb610756568bbded28412463ca9b5", @typed={0x8, 0x3a, 0x0, 0x0, @ipv4=@broadcast}, @typed={0xc, 0x3b, 0x0, 0x0, @u64}]}, 0x14c}, {&(0x7f0000002840)={0x1274, 0x2c, 0x400, 0x70bd28, 0x25dfdbfe, "", [@typed={0x8, 0x46, 0x0, 0x0, @uid=r6}, @nested={0x11ef, 0x21, 0x0, 0x1, [@typed={0x8, 0x1f, 0x0, 0x0, @fd=r16}, @typed={0x4, 0x83, 0x0, 0x0, @str}, @typed={0x8, 0x42, 0x0, 0x0, @fd=r15}, @typed={0x4, 0x2c}, @typed={0xcb, 0x7b, 0x0, 0x0, @binary="8b1fae0770f030892cb33427366149bcf29703e3dd793a81649d57a8fd1bdff2d3ab726aa9d8473793fbae8792ffc1cd27da3098c20c296f7967c190615919ff9089e3f04a7f041d461fc64d86da29b988c96989c68609d3b0bc7973d030fa72a04dc71a34a92f70c8d238ed60a1a34c3fcda6e36a2c8497a99070d0b2f5aaab4376dd3023584e1d02bcffe272c2706464e8314118e94dfc2c04c12220f558c02b9f82528f62db3f7e7b40ecb1af9d3d3f431b685e626f56dad283e854587388bae30a42e8833d"}, @generic="016679556b10f8b665a6cd35e2518e54295b47d547848a61ad639b5094cff0ec0e2c8d8900dbbd8e4035ab459d4bf5fa01bbcf175621e3ca7e004c475d3170dfa84f220652a093da980ce7d975ddb3d07e4670d298b6d0b32e16659e6682b35bcc0bb327658b226eddfa7b19e66918541c7d45f37a2f3c0779da65c6c021843fd4c7577e6497be428ad4ca20b9a4ce17232c89c54536372910eedd797f60da4a770cbc9cbb5950de7b5e547a1dcc37ca01f369cf5fcbf0ef8d85e29949be5adbe6142997d2a0f8f6e86bad0106d57408e8dfe5c8a8e5a2eecef9c26294bf9ff4a5089ffdd45418d4888bda", @typed={0x9, 0x82, 0x0, 0x0, @str='ext3\x00'}, @typed={0xa, 0x55, 0x0, 0x0, @str='$o.\\[\x00'}, @generic="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", @typed={0x4, 0x46}]}, @generic="c9186d09d7dadb821721d1f5a72aab6a05bbb1a4421667dba3191bc35e434dfd942d4b485e27d969c8cc25ea390d99360227807def594abfaba400c32a5a60c7fcd966e7550b8e23239a4da4c55d629457243bb1b138d63464d477680adb8c573ad066a0d25a02142317"]}, 0x1274}, {&(0x7f0000003b40)={0x13ec, 0x31, 0x1, 0x70bd2b, 0x25dfdbfb, "", [@generic="fc534778c8c980989289c2832567852eb05a902f6b3f9f5d75b7b1571977de4fdc73c39d1e8b126d05c67f06e30d13c29b4c130408294d9cefe9cd9b39ef750d879400e0ddc778fe9af719a970a2c76fa31c0ce2fc2308fbd12d796e083942aafb1e75b63d06cf3c5d4aeb8214e89814a2374b14", @typed={0x8, 0x6c, 0x0, 0x0, @pid}, @typed={0x8, 0x8d, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0xd}}, @nested={0x136, 0x30, 0x0, 0x1, [@typed={0x8, 0x72, 0x0, 0x0, @uid}, @generic="8448f7a8b3e1f467ba4b008d3e021272934b98b52d7495b38da0726792658496b55b9822a6672a3b58fd0fde92b024cf1a97f26b63747d0aa96ab33b6ba38b8778d89fbb36326c75d14f6953482d0741be60823809b6", @typed={0x8, 0x4e, 0x0, 0x0, @ipv4=@rand_addr=0x64010101}, @typed={0x20, 0x1b, 0x0, 0x0, @binary="1aed190624297ff0004955779562424c480609e60279f49c4cd2262c"}, @typed={0x9, 0x11, 0x0, 0x0, @str=')}%@\x00'}, @generic="6ead16005fe63f35fe70ce9f5888", @generic="1dd37982a53c1f218caedf97cc4025ba43868b34510aa6b0b3d00675838714951515022a761d8f97d60875199cbabd8cc4ac0c7a8885aa35721b46841b298d63b948c61d2d80bc80f1e4e26c3877c57015fc2714394bc7eac9fc9b55efaceff506319f39ab7c83f1a2cd432eb65baf703312", @generic="bd243f04b61ef34f6d7566f9f86c2a17b858188a884bc39deb87ff5e3a3210a5"]}, @typed={0x8, 0x9, 0x0, 0x0, @uid=r14}, @typed={0x8, 0x6e, 0x0, 0x0, @fd=r17}, @typed={0x8, 0x18, 0x0, 0x0, @ipv4=@broadcast}, @nested={0x116c, 0xe, 0x0, 0x1, [@typed={0xc, 0x53, 0x0, 0x0, @u64=0x40}, @typed={0x14, 0x6b, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x1f}}, @typed={0x8, 0x29, 0x0, 0x0, @fd=r13}, @typed={0x8, 0x26, 0x0, 0x0, @uid=r10}, @generic="912283da56e7c475a8502132a12fb022a8590f0933f8ef95a2f6a1b8b36cc970c0e3dda6ef99ae9a", @generic="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", @generic="58293acc9b38370c41031a9a3127e0b9514a54bfca032c008f578492acdee1535370e13141fdca6d94785f8cb4f6b54bf71f1a5b8afe1f72787297116f4a82d6dd6fc22d92d39301a75204e1c54c9e8b6d3ae075b6b96df89ed8d78fa3c592c2c3e65f5e8317c9f67b6e065e23e9b020ca88ce06bc4f408a8842b76af4b2bc316b", @generic="d13a5462bbe4def8cbdb0496a389705f5c4d3b048fd6ac8834d995eeaa7ed675ad4302ff713dcc12c74324996667a083d34aa7ff29e9d98ec7f1c94c9e20e381dd1ee9ab9d638006d8d436de0228973ebce2c27e70378d3eb1cce319d483bafa184a180244ca7f4f1b21f85b04b6923617af0468fb7a9e995746367b442516effe1f37eec5e99185a7233e1167518b"]}, @typed={0x44, 0x19, 0x0, 0x0, @binary="7b9022a8bc256b7a2514367e2a2286d2f2024d740dcaf8dbd81eee15cbd672a651e6540abb95a654f660f625a2f4433b6abc018d511e0453972679059ff260db"}, @nested={0x58, 0x8e, 0x0, 0x1, [@typed={0x54, 0xf, 0x0, 0x0, @binary="d10bf82c3cdf92531ed20104c70eb33a5fc3a45bc5764a2297bbd0f5127b67525a914265dcac0abdbfc2fa4d486231e82e1e0a587620a73aeb952f02e620abd53889a13c912d045f5791421fc42ee4c7"}]}]}, 0x13ec}, {&(0x7f0000004f80)={0x12ec, 0x28, 0x200, 0x70bd2b, 0x25dfdbfb, "", [@typed={0xc, 0x67, 0x0, 0x0, @u64=0x7f}, @nested={0xce, 0x6d, 0x0, 0x1, [@generic="127d404b0c4ae6a1c847763421354bf18339be03a05e1c05fc086c68c64c6c714871fa722f96eeb74f7910066283476a92d27985b2a9f2505de9faff81db1384bdbe039173f903f048e8a7bbebcf5af3cfce759c64a5899dc5892b4556b2c1aa2c7facb225ae179cca6ad03e2181b2f49d5dcc2c64cda1f16a2428ba72b05dbfefe287d6b26d795dff23398626d27132efde9b53b9e5c44da4881423ba563c568f03681a459e3478b3ba400109c0bdc1d0eb39e48e994a1946cbdd9c19dc97ad8aedb1f88d2e5e4e9260"]}, @typed={0x8, 0x6c, 0x0, 0x0, @fd=r25}, @typed={0x4, 0x4a}, @nested={0x1b1, 0x34, 0x0, 0x1, [@generic="bfb1f31497a23c24c6b918c12c389cd9e7be87dc9f538a1e3e2b8bcef6e9910602677c55d1e2d2638b8a2d7d3b44e00aff6251f5791f756acaf43a47b689e8021080d66ca57c5501170edfdcedf058539c52bb4557e044ba36dfbf27424856d4c235e4f55257ffdd16242fbf2eb242afbb620001d960c628956288d8bd067835f2a67830e71df8142633190610bb72166ca9dcab49335bdb49efdec2731765734862843c225180393ba9df25543e06a4d46cc52e6d24d5c3e96a7f0516602f6216a013", @generic="23fc88ca19be078dc3d8349d89d14309ec5271557c5b80878d569a555db5ff43c1d05b181b13b07411102cf2a177b2c897f29364da4aa0da9d2570d70dd6070d13d9adc1d1c732bbd79adfec45be08606faa2be3f53b6a22dd8ca1280d91cc4e716809598c97678e7884a90b68a6f90bd584b46d6be8ff13a36119a6b7ea2ef5ea88e80a3f46929c2bb14a87b4f7a2f06ed83bd612803a0af6545b08bb8191c3528c2c3052efbd3100a54ed33c47799ac192b090aae26921029f98b66182ddece484e799f3fcd2c1f7c11d9a6163004111c7e29ccf7eac9958379f97ee335d0ade885af5a104708bb32f"]}, @generic="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", @nested={0xc, 0x94, 0x0, 0x1, [@typed={0x8, 0x32, 0x0, 0x0, @ipv4=@multicast1}]}, @typed={0x14, 0x5, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x27}}, @typed={0x8, 0x52, 0x0, 0x0, @ipv4=@broadcast}, @nested={0x18, 0x34, 0x0, 0x1, [@typed={0x8, 0xf, 0x0, 0x0, @u32=0x5015}, @typed={0xc, 0x8, 0x0, 0x0, @u64}]}]}, 0x12ec}, {&(0x7f0000006280)={0xa8, 0x3a, 0x100, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8f, 0x58, 0x0, 0x0, @binary="a0a63e0a7f8041399df542e0598f35b67094276d268780c83118ad2fe136a2e4706e004c0bb532a4d4e2dc5b3f33e166360b4a2c0f9c435306a23199699f9bda7e04b2e38aba401ca89bb488b623926eb7b20321ff1a1643a613ec8263085a0d4fa9a42caf4a0b18e6f0c06f3f383edff649975acd22213981cd234e8af1ee5fef5231f1add71f7c076d55"}, @typed={0x8, 0x1a, 0x0, 0x0, @ipv4=@multicast1}]}, 0xa8}, {&(0x7f0000006400)={0x4f0, 0x24, 0x400, 0x70bd2b, 0x25dfdbff, "", [@nested={0x86, 0x76, 0x0, 0x1, [@typed={0x8, 0x6a, 0x0, 0x0, @uid=0xee00}, @typed={0x4, 0x4f}, @typed={0x8, 0x51, 0x0, 0x0, @pid=r5}, @generic="64a31fe898f0744a83372575170c7f037e505dbfba3d1486663766141ba1b8a2bf2ce4fd4d947935f4eef9844b13912614b04f5f36f8b9bb5c6e2477c7e3449028c8a44c1f5b6b40611596", @generic="47c2b07bb9b9128d29ad6cc127cf699402533120c7a05adf5df930", @typed={0x8, 0x2c, 0x0, 0x0, @pid=r3}]}, @nested={0x24d, 0x6a, 0x0, 0x1, [@typed={0x8, 0x80, 0x0, 0x0, @ipv4=@private=0xa010101}, @generic="90ee54fa6e7c8725bdb80101fc5b98cbdc1e76e46d1aee6ab2f9aad0affca5197fe0fb773d95046e5e8d250797097dabd482c4c4b5fd1cf99e4fba47c3bd1761e7358fd888abf6", @typed={0x8, 0x8f, 0x0, 0x0, @uid=r26}, @generic="6402b770b5722830e5055d4faa09b1396cee7359b53d5d280e19cb9e1c388af54ee3c938ef9e0b97f3d9fca20d3e421e8c7baea3d0ea1b133a8643b98ce2fb71b53422fa48603b38affa096e689701ce4a3f03084fe3c41f982227a9d0a9f74b43634e4cea3fd44326ba77bf0363c34b4c1e56129df849204c30185d67adb7c789d14483fc4acf89327dcbd0de55ca4c5ccba0a55ecf449feda39d67382966b0e087122c450d3975cf855cb079a03f12dd85e0ef454428f21de8ba19f4", @generic="a011bc034fc839742af189a956c270f30dd0486daae6e0f9db149c10cfcfa191c475e178afa2a75cfcb5be06e40eaeab9bb5118b68ffd6cfdcd25373a304010f907661e1c257f872b5bef429a28a9a92e6a39163aa6d5cf4e2496667611b62011f", @typed={0x4, 0x6a}, @generic="3931248c873ce15fddbfae6d13ce841ae58041c3c415c0612ef5bfa3d49f1474843e8e755058cc8e4b0a328bf346d08e18e1e058f09011c0bb3b91c2c52059951877371c469a7a29b797fd1ab05990c69fb4b7e58c84d1f7686d38c51fed5b6badce72d79241a54c252cd7b60655cfcffadd6818849d338ca768a7b6290632fad6947e7c104290a8df9dbfdd6bfcdb7e1560a596ec796be40df450b49c903c222549dfea3f89e2043f7ea833225df1c5fee0484a", @typed={0x8, 0x82, 0x0, 0x0, @uid=r27}, @typed={0x8, 0xd, 0x0, 0x0, @uid=r10}, @typed={0xc, 0x88, 0x0, 0x0, @u64=0x5}]}, @generic="18df3554a9b2aa77e459a00bc96ed7dee457f44f590ca2a9e09f4568b4e130dcb72cb0e6ae0aff27612c61e153cf405202e3548910000c94a4ae6555490d33d2a6f819e2a637ea72c5d157fc0ad68f2035f4a5ac5477f16b20b233d248b9ee1ce38ed1313abb832b7ad67933f8b4d61448471864401a0a1cf5c12aaf59d7a94c28f9085cb8b0560fa100bb1fae7113420dbd000be6c76d58e70d70ca13e7cd7b3b28cbd5e38142c6f893a20919c5e953a5734405ffe6bc0d63c6448a401e4b3add4ce8c9616b01205322014bd5d4daea90e1ce48072bd18efe288938992b3916ca68c1dd264c735a3b8c562071ad747ace", @nested={0xf2, 0x17, 0x0, 0x1, [@generic="b6e4d0505ed1ce10284ba08f6eaf601be4a6e3db6993d91475eecb61122343791b02295826da11d83f29fdde446da749e4a4c8514db97296a197d3150f00499804fec328d8b2ebec057699c5d242f3b7769a9402fc24db5fe65e67ea6e8179a6f6a450801af4117b9557f972b42b97e3c8d342bd03f0ebc0404d71b461e13478a24a6c4fc7e15313f51d4614a4c7a950e8ff8f200a7f43c162156d99860a5f04738f32acccc6c14a0dcf1c058bda902987366efc0f2ee0f5f99ea201bd5f1cf821bfaba3dd38141f3239e3e6225091c6fc738e2d0fc6c0fc88483391f21bea372829b5e55fbe9179f3ca070ecc5b"]}, @nested={0x14, 0x3b, 0x0, 0x1, [@typed={0x8, 0x5d, 0x0, 0x0, @uid=r4}, @typed={0x8, 0x8a, 0x0, 0x0, @uid=r28}]}, @nested={0xc, 0x7b, 0x0, 0x1, [@typed={0x8, 0x55, 0x0, 0x0, @fd=r21}]}]}, 0x4f0}], 0x8, &(0x7f0000006a80)=[@rights={{0x18, 0x1, 0x1, [r20, r8]}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r29}}}, @rights={{0x24, 0x1, 0x1, [r30, r20, r31, r19, r18]}}], 0x60, 0x4}, 0x40000) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000ac, &(0x7f0000000180)=ANY=[@ANYBLOB="7374726970a22a653d30303030303030303030363c000000000000"]) sendmsg$NL80211_CMD_DEL_INTERFACE(r16, &(0x7f0000002500)={&(0x7f00000000c0), 0xc, &(0x7f00000024c0)={&(0x7f0000000880)={0x20, 0x0, 0x800, 0x70bd2a, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x0, 0x45}}}}, ["", "", "", "", "", "", ""]}, 0x20}}, 0x40) pwrite64(0xffffffffffffffff, &(0x7f0000000240)="7fe6ba04b6da695e4f2101b9248288cd5bbff69ee9eae75c95169e8bf483344b929ff7a2d60ba4dd21109c96f7b2ce5f6c196b37ddc08493140bbba509359a3c304b89fe32b7be58c1c5966d153beeaf19878dc054b2d9e832d603560964230bbf1849cb049b58a15ef87202e185f3dab6f01c27fd64e840fa067f538f12f048ae84cc7b7c82bc20a42b190d823d320a5dd80f6841058723192f7858e23ae913a549cf3b6de4d1131fb27cd26032ee29e6668675ee35fff0b5da2ed658e13fb7ab5126a9fc6d3cb86e4f0dc398512f293d5d127a74890d35f7906b02c6548141769ccc14900455ccfd75", 0xea, 0x1) 07:20:32 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 07:20:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8912, &(0x7f0000000000)={'lo\x00'}) 07:20:32 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNIMAP(r0, 0x80045432, &(0x7f0000000040)={0x0, 0x0}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)={0x5c, 0x6, 0x4340}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x4200, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f00000000c0)={0xff, "afa0ec4f2bbb2ea0ce9a319952e4977792582f5c4fe03b440440dff8e7700d65fa52c8bbfc7a3711adedac00727bd4e201b0702e0248f734cc5e13b227ff981ad8c3ddcde481a8ab022fd9253fbbbd6150ccffb3daad9329df883e73286b0827c63a9221e4d05d1e26790834fb90a9b61c581fe5fa107c3d7f44d6c8df1d98a8a21437fd62237b6d86a737e5a4ea000e344e945edab1d1c7f054d47451832aefcec73f491ea563ee3045e3483bd32c948baa2c85dc0c5cf7c2d25cf3d99f9507d0c02489696f95a713d9a49e24bcea2b9d684ea2b77bcf002dcfc1f3477d66ce2b6b59f47653fd03b225468c7c920024ce99460ba4936700d7e04c9245065b0b4bd9c4021b1a8aed252d609b91df708dc0b6c8c2dbbf3ae57191939d5be62e27b65b60430dafbbfdd059f0c6cc5ce4c7b9132b8c8efc99bc340b2641e569b9b5d6e5126aee37319413c9047a2b100811aa6e2a41ac3d2786816d3a2c52f4cd70ce36d4ceed03e5ce357bdf957a4911373b1daa4d32be719c945c899cce0c7fb040d98654fb075b89a03e1733b8a23bd26fcec3d9f46b2db3076595877704ab06183b55f6fa36055340c0c8615d882061594e2c7b6c84ab7d386adca0e2b452c5113c7bbdde8f08f7832fca7ef78645557094e4285645e7a1eca77bbfd865096caf4e1a4928f82f28c5fe89be48f97a9ee1a3ef3d898da7573c25fc690cb2b6d2"}) 07:20:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:20:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8915, &(0x7f0000000000)={'lo\x00'}) 07:20:32 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x9, 0x0) 07:20:32 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x28020080) [ 783.502893] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:20:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8916, &(0x7f0000000000)={'lo\x00'}) 07:20:32 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xf, 0x0) 07:20:32 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fff) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000280)={&(0x7f0000000100)=""/149, 0x95, 0x6, 0x4}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000c00)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in=@private, @in6=@ipv4}, {@in6=@mcast1, 0x0, 0x6c}, @in6=@remote}}}, 0xf8}}, 0x0) 07:20:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x0) 07:20:32 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x28020080) 07:20:32 executing program 4: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)=ANY=[@ANYBLOB="01001000010000001a000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000000000000002e7677da44653000"]) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x3) prlimit64(0x0, 0x6, &(0x7f0000000000), 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) dup(r1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) syz_io_uring_setup(0x1379, &(0x7f0000000100)={0x0, 0x0, 0x2}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 07:20:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001900)=[{&(0x7f00000003c0)={0x14, 0x2d, 0x703, 0x0, 0x0, "", [@generic='o']}, 0x14}], 0x1}, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000040)={&(0x7f0000000400)={0x1350, 0x14, 0x7, 0x3, 0x70bd28, 0x25dfdbfd, {0x5, 0x0, 0x7}, [@nested={0x11f, 0x65, 0x0, 0x1, [@generic="9061398fc9afef715b00d29312c5b04e4ec39cd3e16415b0391489b97f577e688b6ab03bcc8b47f2ec162883c2fb6e1d02dbbcdbd6bd91c667378e726065e133f3366bd9df91abbd8b321ce8b746c38314afda6b0a51aea97b2ca8be6e1293bbecdfc8474da32d0adc6b4c801a43844a033558578f8ff70b75b4c8d44a558577528698e97e8975fc391eccc8b0227ec931e5679f36371a54e3b2436471f17a8735c00c3c57fa99ec08a8172e648ae8adca2c5f6e0000562db41bb2b383c4", @generic="5400def7f349c50717ba3130df3d226a6d97555624cfdfef2bef570013a8a03edff4b77d42137865dd6da6e8196e21aa725a3e54ce0e2f1767f15ab4f26d14f9cda36b58aaa2961ff92fd6150fa1ed79d52cfa6b06", @typed={0x5, 0x40, 0x0, 0x0, @str='\x00'}]}, @nested={0x21a, 0x72, 0x0, 0x1, [@generic="02fb2c3fb3942f7d9a2fdb04d860fd4d0b9e1d0e0ec22546e083ea73540ae6db5b5b4b3f3fccd7398350ee32e7f3898a51cbae1555f60bb6c67dea6f3ddb6784ddc44910edd5f49c7aba3d6f187f27493f51733893fabf1f630cbe57cb3cd201a9c9de0a2dd08f42de3bf23fb12b885a9043152d592096e797ed1563683c1eaa2793d44fec4b23a8f0eeb3c9877536d5f39ea827b551d6dd0cc45bf0b335e4bb600c97da982d8a1e1ed1a0fe3fd189dac657809ab5d5df1d3af3dd394eed5279763c84ae0781d125c52d0d7cb0167832cf024fe0eae082810a788f6633177f9603f81f5315e7dd4817373eb088be6ee1", @typed={0xa, 0x2e, 0x0, 0x0, @str='^\xd2),\xfa\x00'}, @generic="9c05429a59ca91a62de6be2ce05c0735536be108645dc2427bd48e99af8a4bcda63f125fe9ff349e3df684c76bee667be82adeaf8a0d45e675daee17341024b635271658b798e9d7404ad55afe07d017db70216d20854540b28e3716b1", @generic="6a3c49b94788a2bf06ee8b9692ab3fed915a02df05fa2ba8024330846c4e549db1ba38cc3deb7538b7fee0cdc665eaaa1edc7e252133913cae774c1f6345d609d1f865f53b409c9ad2e3a770c012e1ab644df939510eb57b12fa5a2aaa740f298c561eb035afaedad8a80f857832262f03fc9c94064534a9e4ba34f5768a4dbe266bd0190d2754", @generic="2013c50616b85dcbb79534424124c3b6f9bdef026a4a322c6bd31ac1b04f", @typed={0x8, 0x1c, 0x0, 0x0, @u32=0x1800}, @typed={0x8, 0x4f, 0x0, 0x0, @uid=0xee01}, @typed={0x8, 0x3e, 0x0, 0x0, @pid=0xffffffffffffffff}]}, @generic="af50aacfb30ec655de1a2f3d646ac95793f2e773edb0a04823669c25df269e96674ea470b895bc7412710ddd93c73614833d9777d5a6f97815e75d5a55428865b8a682e49ae6ddaab4613097658a86aed547f829e4513626290c17d9233d189c9d892ef1e807ea494dc92d24e036a187a7d47633dc4bfd6b010104280e0585e3e0d13e2419e34f1905513d485f16d879c7a0236277624edfe57817db4de555d37aa0cba0245d1a9ff0568321275753f6ee37dec753997ba7fbda1c86b16e32abd5d0281f7b72b10872342c861852b3fd909847cf2d00bb72c877ede3b288558678a6c7da9dd9b77a202e7caa52b33d2ae3cf56b2af397abfe3cfdd23f7c85b6d779ec8518cb42e7ba576fed94aaf274492f07ea457ef775d1aa1888dd96aac64b05d838ea1d46fcc287f6dd1784a07a6fac510e7eb8d2356249dbcda84d3d996fd837236b5cb2bc0e3044ed8437f2038efc5eb695a74d4f4dfc586e7cd8ca0df666e30d0692f27912431dc2fb4935e86bc23ce6fa3773f00fbe01db58f1d805bcf30773639cad694fdad41f1b9680765e8dbfde7265c13d38553a6dbfa194fa5b7b3155c1976421ba54b63c1f929637af4ad31074f9ca93903362d8df21fbc49312fd379993640eb680dbbc8ebff676cfce485a33275ccdbb3e64456136f706332404622a8d50f41ebfb9d1de7ae24ea8dbddb71bf580eadf1ab7b3bd0bd8456370a24b05cce598e84e9e69681c380f0a2badfec1543adeb6aa8e0490b761bfa5e54a1ce4951861f48ae732602dd6149b4fb95292e9c5e9950b47f0b27c5e6bfc56dc4c1a33c8fab5adaf4bcf8be1bded9ca38225ebeb14becf0ffffd3566ad0899a959e7721cab30e0e02ea5196e334d24de21e8109774af7c156bc555229c6d46093870460ec517208beb17cc531039866a74cdc3343ec7b5a07963342cdc00b6bbf97cd0406c835b5eb0c6580c825edb0dcfaad509d6c28bd2486fe12c60104239f1a0f39e5f602315b0ec494a7641ea862afc497a242ec6c35cacd70e2483e3b089e86818ed22df12fa36cece9380456a2be85f6b4f4ba02d7ea023c819e8b585e00cfd9f8ff0374cca29224b3728d16d2774ad7755468a1709805b46e55c1cad95a5fc64c2020972ef99bbe74ab93a624cece05c34f96359125ae5863d9f07bd63203e5167ec8cd5ed1be65efc98e1c2073fa1efb727b38feec85532b937ca11bc5d78c3957c2eac949aefa9afdc1083eed8dee7ee455979cdc54fefb939156db83f2f0d5a0ca6593ce075df9238be5477e1428b610ee2fe34285555b2f860a9d5d1808f427f0c9334b16547abd85f6d41a0ca2f9e68dbb9cb89806602e931d804529d5e1c29d05ecd9195d988224d29243924e3ae0d620e6ea2c44ef769495de9c7a9b2b9fef2e5eef32d4d6cb233b222ffb99551325d3cc2abcbc92a0eb1ab2bc34c7125a3f1dc3d01466b7764cbc60ad9c7813fc363002bfc24f6ee5a2618f6cae8bc3de6224695b976c206b3a476e0ccf2ba2ff0764ee41680b22a7ebdac9cca4de47af4a335378d3d342f097cbed968b1292072a43082f8f42bb27d4b3cd7d4153ac805c62cf80af0644ce4d5b8e30088478a4ffa333d5c0c9f5f95262d6883e140ec693c8bd9fb9b547af8f2680091f508a26544a70ba94ed1cbf914fa6ebbaa4d411ebe3ecdb00a03335f9bf2cfb1bca53e118efc806a1812403571b954c3bd65507f58fa5ed4f7c3a327b753c014fa120d983f4c1422c43246de3b85a97a37e9face994d263b05d4788dd3ce2bbcfbe88a7faf7c491310094e137e3d2f03302628ac810e031ab85e17f50c715600cd1343b1764a4c2e3db67bb99ebd76fe7826e162d913fc6546ab38c8d0411540350cdaf4a98ee36cc7ab55ea642e5f48d5efecff037075a2e514427fd8e984ec359d301b1221e55b55572cd48f5cbbc708311967cf6e59b5443b5493da62a1754b7a81522cdfad4341e5b059927b6edf755a5983c2e9cce933475899f7731a58e0263a4fc24ed6bf71c8e372b665984ee36cf52f3b31b2e1f83b6abdcb2c3a109b6174f49eacf712f2c33b0d715850487542215cbe23977013c7fe50b9608233bb9bbab9f916cfaec4a10cc8956f92ef22541eb3e16c2c99f2666af532b366fbf5a8f8edbccd757b80c8dce927a99fbc3c4e678702e42dbe6abbe1ad80cfddf932ce8ef4564c978380bb4759dd10d3f35ee94d140043ebd207c5d8c8e2c2e69bd21624537147b6b0a44e147226ba08cef2ef0bcdea887200ba345d899c972e08ee37123a3bc61c417c0f22f41af4acd16d6b3131f75f333bc6cccbe8aa9a36735837f47c77eb6a8ebc22857abcd12d8a217960a398b2991415589964c073386199a54acfc2a6f05dab6db61636943d584d5b1aed84f9dc13e3a0d250319fce496813df996fbe2ab71dbab8b5ea92f05f4b63673b1186a7f7774fb810b66468e8800f921b9ffb7fa40f635d148e21e4737497f4e735c3025af33faa0f20960187f7d4b9635aed157b6bce6f7fffa16f113946b7a71c7a8d8f8ec41878ebf76b4c516a5fe683934e45d0aaf16366e5839b6e834dd7feb5218f5723e2febd9d35ce055c717c502476a0044e94044e8c3d2e75dce4cda09772bc952ccbe830426704b77d6ebb3a23ab9219f847dbc6cb9a6e2f16d3a3483ee0c49f93f42f7570f579f4a11cb77c337d60e242866aa62188be9a49aadd806450b129e4fb65cbd2116296fc7e0a227c2f50cf6b32fd832fcc0e4176a44e303859e561eddd9effcb7072f57d763d0f7a55316b108561bced56c67a817baf07c9736ee2625e93189c084bd9dcc5841aced9e9dd37994a8c2543ee32e98354f55ce4a2eb680d5487a88ad4a9bee7b7360c828413e6b25064c8d4f4e4ed03e4951dcf0db6d68c2aac39b1fa72ae3b4644139d8052c9c199c13c3fe09e72c70e0a2b03521dcf0baac3f9294f27293d36febe53e63063ec786e408c5812240052d88cbe69167f43d6c7b57832c77ebaa18b261303756215e391cffea3431f04619f67e2165e0ba5d89ba4c4cd3cbe0b29efdfc2617fe6edc1404964545331c52cfb68158526cb0b693d8cbd6ad4ce9d1c15471504ff3e67121fc491045192ca5892a48cd9851cf4df84b138ba4553b0e0145c89c5e484e1f883acacedde26af6d8c32a61bfe36f93ffbf360bf0e7f0de39a72482f9177ed1b64462639b53a705e46a3e2ef32769c69bdb486ed837db945fbf5aa8010a17e43e8c4f0c82fb49c6cb112206624e636f3e023023d08c48663a2cfc4dcc86f8c76bd9c990d6de9e95cdcfc0b14c00ada87fe2a14cfe0209e570979cf12c56ae399dcb86c9dd72c107309f1094725da631d0e7fd8743cdb976b3fedf82a3775ff437826d6b1797f15d72c18a591d79ddaf1eb0d1c400d92f58804edbdb2b14f6f0cce2f3023508a8609df116f299552d5ab6e761769a0d4be2551620829c3cadf59f56abb3337c98c4da397f3aa21bb26a75486d95881b04e048c4e36a6d1dcf8bbab2f1f67c118f7092ef5112959d8b467698926919efade2b910993985e84919f5174a20af8a94c9e57eb2372149cdda8ed75b8bd363344a2da65f4a24a75642f9979c2d85427cbe98e45db1c7dfe306e0f6947e64595f19bd706439b86ba47f3d146e98cce84738e2d163eb74f16f2a502c5d862da237df41ba6d5e84c694556ad420857a9637593b3ee2caa7ac2bf7b32578d064cbee3468f8c852d2de82ac7d5d364cd6130b02c790efbbef0b3909b7d2a21496fb4c569eab999085ba927ac3e2aedaac2d4a10fa3084fcb81ccfa22f5e76e675c9db184c823079f8d81db43fbeade399db12786b20fdb2e991791971f6dad72a1f26b1763b6ab690c47aec877432a1c678621dd7c7e5484a277b584507ffc4c15dc32e6e8f166910047a9f4a0dddd79d35417d983b68eca5359edcf2c1edf86d995b561d56ce012b08baefd7d8e7a0a4ff09be747673f89cf3f54f8d0c234082c1507d046080bcf916ff6c41abc47161cf4f37dce8d1241c27fea33e741f5f80bcc680e007545c03f2c2256eb38ff9dad5a81b4980e96185ee8c3030b342f9bd562b961896e7e4d5be906a840332faccae92b9468aff2aa1364dc1afae8106d91f7a452ec3debc41e7d2a5e2806278f334911a255f5ce6903262125d652facdcb513baa79621b05366556c6db628545836d10cb75d17a3d79f0aed9b3c46f0b05251c5774ba2a0294985b09bde62f26f1c7d99730195872f6e73989d5839337bf6d1e26cb2a3115d4018483a390a34cc6abd61208481afbf3d5f3087ac8478e4e8189694b9bd0428522b3d339d742174055d368f9c91711ddd733038446d70bba9e0528258e0e0166b7fb0027f039f511231e26d55721659855c7605d315dd600fb209477621560c6641f4bb8994cfe91485abff923e75a6d0cc51fcc93e635d0e1fd6c2a9ca0d08dc3086c7cce0c83b3915c37a7647afc3b9c57160188297542bc75029abc3b79645b58bd61e474dee20585d1792af52adb11223d140078f1b2a14d3d593bde1ac2487cde67eeaaa43130f4ef88a61c95d7f5e0992e5878d20476b390480afea825a4b884bd2891d04bb551855670692ac63523d833df3f8eebb721c440d911a41c2e8367b4b33e661c506cc12f0af5b2e2ce247a6b11f7ffea8820ae451fe7a88dcf29eef348f1d53f76183b7926ba796a26b9c340e759f409ab7d472fa53223597cafaa56ae633e91dc6b71968a02b0892c3c4b70144c5fd1541a07283bf821bd425a783e2abb213a28d4b45af62c68cab4334b5a8820168456aa202ce94697e61c0a429e46ae36366cd944d36a26701fe2cbe92eb0c63898cb71924fb3241c6c225061c248ae367a462a438fbcfdfdf95e9f4fff57dc70ab5a138646befb24570d680d66139e165c4465e53bef543cf3954b7812977a7006eaa27e5e06e3787eee9e20cc5e0533bb200b1c303aa5020cf1cfb36cdd8633c7e0184dc3323477a7e0935bee5b6e62d7fd6987ba1f3214ca4d5469caaf80f9c747fae6334a102c2849950fecf0577b5cfb53a67fbf4d61992ca8edb36243f70a5bcd9cf593395f11b53077b9601e5bcbd342bd507818390a9306853df9e612aba00326abc7afd6b20dafefec1361130bb766125f3337ec07a05ac53075b909b2c38220403b48b19b8e876d22ac9f607c67bfa3f9340b147f192f8e89755268c43b850ec2d16b9d280ae2e3e968b5e76bb6f246e97128cc722392bd93102eaf219adaa1a5951dc462089a47e94c566db8f61a1caa2e1958212c2d34a15c496f0859a09071ecbfe1f00bf1c8461f1b3e11532259e2c8f32f04d5f49fa8e5d347f02022a5d87bb4196d65bf2197d1bc78395db19168c86d1f98ca2db75c575d2114152ab2c39839f46d472bcc486543c23abc37838c5fefe81208d2c36855c25bf2108b9ba17e67630651a1660655428fbc6be1240d5ecdff94459d6456e8fefa12fd978386621c34679e0abb486c5ff26308713231918a82a4e6881af1d4034b9b3c55bb3236ebb5ab319f5e0e225af87fcb0efb470ab4a2e85541c8548ca0a91bf9aeef492b5764812eb3762ceca3e4453fad2b88d591e4c9644652f825b8873b75be1a72e192e60ecc9bc0e85e4158c8064f3597d20de8789553f4d00952dac463263705e0b5ff643b6ebb8b5f828fdbd19e73faa85ccfc4bbe510891c47a3f982e5620d06e55f516537c6e8471c4d8e2a73b252c679ad680cb5ae89645257d25cd4084053ecb42d00d79"]}, 0x1350}, 0x1, 0x0, 0x0, 0x40}, 0x804) 07:20:32 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x10, 0x0) 07:20:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001900)=[{&(0x7f00000003c0)={0x14, 0x2d, 0x703, 0x0, 0x0, "", [@generic='o']}, 0x14}], 0x1}, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000040)={&(0x7f0000000400)={0x1350, 0x14, 0x7, 0x3, 0x70bd28, 0x25dfdbfd, {0x5, 0x0, 0x7}, [@nested={0x11f, 0x65, 0x0, 0x1, [@generic="9061398fc9afef715b00d29312c5b04e4ec39cd3e16415b0391489b97f577e688b6ab03bcc8b47f2ec162883c2fb6e1d02dbbcdbd6bd91c667378e726065e133f3366bd9df91abbd8b321ce8b746c38314afda6b0a51aea97b2ca8be6e1293bbecdfc8474da32d0adc6b4c801a43844a033558578f8ff70b75b4c8d44a558577528698e97e8975fc391eccc8b0227ec931e5679f36371a54e3b2436471f17a8735c00c3c57fa99ec08a8172e648ae8adca2c5f6e0000562db41bb2b383c4", @generic="5400def7f349c50717ba3130df3d226a6d97555624cfdfef2bef570013a8a03edff4b77d42137865dd6da6e8196e21aa725a3e54ce0e2f1767f15ab4f26d14f9cda36b58aaa2961ff92fd6150fa1ed79d52cfa6b06", @typed={0x5, 0x40, 0x0, 0x0, @str='\x00'}]}, @nested={0x21a, 0x72, 0x0, 0x1, [@generic="02fb2c3fb3942f7d9a2fdb04d860fd4d0b9e1d0e0ec22546e083ea73540ae6db5b5b4b3f3fccd7398350ee32e7f3898a51cbae1555f60bb6c67dea6f3ddb6784ddc44910edd5f49c7aba3d6f187f27493f51733893fabf1f630cbe57cb3cd201a9c9de0a2dd08f42de3bf23fb12b885a9043152d592096e797ed1563683c1eaa2793d44fec4b23a8f0eeb3c9877536d5f39ea827b551d6dd0cc45bf0b335e4bb600c97da982d8a1e1ed1a0fe3fd189dac657809ab5d5df1d3af3dd394eed5279763c84ae0781d125c52d0d7cb0167832cf024fe0eae082810a788f6633177f9603f81f5315e7dd4817373eb088be6ee1", @typed={0xa, 0x2e, 0x0, 0x0, @str='^\xd2),\xfa\x00'}, @generic="9c05429a59ca91a62de6be2ce05c0735536be108645dc2427bd48e99af8a4bcda63f125fe9ff349e3df684c76bee667be82adeaf8a0d45e675daee17341024b635271658b798e9d7404ad55afe07d017db70216d20854540b28e3716b1", @generic="6a3c49b94788a2bf06ee8b9692ab3fed915a02df05fa2ba8024330846c4e549db1ba38cc3deb7538b7fee0cdc665eaaa1edc7e252133913cae774c1f6345d609d1f865f53b409c9ad2e3a770c012e1ab644df939510eb57b12fa5a2aaa740f298c561eb035afaedad8a80f857832262f03fc9c94064534a9e4ba34f5768a4dbe266bd0190d2754", @generic="2013c50616b85dcbb79534424124c3b6f9bdef026a4a322c6bd31ac1b04f", @typed={0x8, 0x1c, 0x0, 0x0, @u32=0x1800}, @typed={0x8, 0x4f, 0x0, 0x0, @uid=0xee01}, @typed={0x8, 0x3e, 0x0, 0x0, @pid=0xffffffffffffffff}]}, @generic="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"]}, 0x1350}, 0x1, 0x0, 0x0, 0x40}, 0x804) 07:20:50 executing program 4: syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x100a001, &(0x7f0000000000)=ANY=[@ANYBLOB="305c6919c600"]) 07:20:50 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x11, 0x0) 07:20:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x0) 07:20:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8917, &(0x7f0000000000)={'lo\x00'}) 07:20:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:20:50 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 1) 07:20:50 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000280)='./mnt\x00', 0x85f, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000400)="5c6c10114f682a1e3945ab3c481ee93af8c431720e7fac521b35c7c062fdcb9d9dc26c121ea3fefca299127081e4d25f1d08ed466451a1e263b9fb5ef122bf2f6aacca21cf816bbc2b222d1162d6760d7bef3f06b3d0f786eefbd279ac2549192e2c8ba98d4886a0134280d841ca85fefefa379edbcc99aeccdbf2dd142fe1318ca9aabb205a28acc40e12533de1366abfd2a2e572e11a2fe14cdbc4aa543770625e2891f8fe1369f4d8498507643703074c854fa85d9e48e12705c739145c54bce9c87b2b252cd80e949aba40cd0bfd", 0xd0, 0xe65a817}, {&(0x7f0000000500)="64095acdf2132016393b1c34b72115e50470b0182f48df8ac2e8d8e7ffc7555a9b31032f7717fe36f979e148a542a37f3a5f2c02fe60f74e8f53e2ce8e932d", 0x3f, 0x5}, {&(0x7f0000000540)="694a965d9d991e283e0151394b672d0688bab506e80076512176fe802cfd6c7886d1c934725b2ebbbb45c4c017d15f3d3de2579305fc9dd991d061b02ca68a7aef", 0x41, 0x8}, {&(0x7f0000000600)="15d0adc27c1abebf2965459e7290d2359496baa22bda1935977f983847d08807327dad8a1539978d56d4c4e514a27fe6b289c9ebc0a56666a4e2c1ccf27757cb4518fe4efb0624c0d9e75dabb416ecdee7abed3f2d48e62c78411cb1c1d03e5dce88b33e26c6dfb10aa0d74f2dd62dd65ed039dcdb5bd28f281265de3e6d8bdbb6cc62e876ae", 0x86, 0x80000001}], 0x34000, &(0x7f0000000740)={[{@mode={'mode', 0x3d, 0x20}}], [{@smackfsroot={'smackfsroot', 0x3d, 'trusted.overlay.origin\x00'}}, {@uid_gt={'uid>', 0xee01}}, {@dont_hash}, {@dont_appraise}, {@dont_appraise}, {@audit}]}) ioctl$AUTOFS_IOC_PROTOSUBVER(r1, 0x80049367, &(0x7f0000000800)) r2 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x80800) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000180), &(0x7f0000000200), 0x2, 0x3) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f00000002c0)={0x7fff, {{0xa, 0x4e21, 0x3, @private2={0xfc, 0x2, '\x00', 0x1}}}, {{0xa, 0x4e20, 0x3f800000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x5}}}, 0x108) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200), 0x0, &(0x7f0000000040)={[], [{@smackfshat={'smackfshat', 0x3d, '^*&@'}}]}) dup(r0) [ 802.051618] FAULT_INJECTION: forcing a failure. [ 802.051618] name failslab, interval 1, probability 0, space 0, times 0 [ 802.052612] CPU: 1 UID: 0 PID: 8522 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 802.052661] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 802.052684] Call Trace: [ 802.052696] [ 802.052710] dump_stack_lvl+0xfa/0x120 [ 802.052757] should_fail_ex+0x4d7/0x5e0 [ 802.052821] ? create_new_namespaces+0x30/0xaf0 [ 802.052874] should_failslab+0xc2/0x120 [ 802.052944] kmem_cache_alloc_noprof+0x60/0x3d0 [ 802.053020] create_new_namespaces+0x30/0xaf0 [ 802.053072] ? srso_return_thunk+0x5/0x5f [ 802.053113] ? security_capable+0x2f/0x90 [ 802.053171] unshare_nsproxy_namespaces+0xc0/0x200 [ 802.053231] ksys_unshare+0x46a/0xa10 [ 802.053297] ? srso_return_thunk+0x5/0x5f [ 802.053340] ? __pfx_ksys_unshare+0x10/0x10 [ 802.053413] ? ksys_write+0x1b1/0x240 [ 802.053496] __x64_sys_unshare+0x31/0x40 [ 802.053563] do_syscall_64+0xbf/0x1d0 [ 802.053613] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 802.053665] RIP: 0033:0x7f119793ab19 [ 802.053693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 802.053733] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 802.053772] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 802.053800] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 802.053827] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 802.053853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 802.053880] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 802.053935] [ 802.087468] loop5: detected capacity change from 0 to 264192 [ 802.101169] loop5: detected capacity change from 0 to 94317 [ 802.101984] ext4: Unknown parameter 'smackfshat' [ 802.130005] loop5: detected capacity change from 0 to 264192 [ 802.135672] loop5: detected capacity change from 0 to 94317 07:20:51 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x0) 07:20:51 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="01000000010401020000000000000000000000000600064000050000"], 0x1c}}, 0x0) [ 802.223076] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:20:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000006880)='syz1\x00', 0x200002, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r5, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r5, 0x5441, 0x7fff) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r6, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r6, 0x5441, 0x7fff) r7 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000007c80), 0x2, 0x0) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r8, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r8, 0x5441, 0x7fff) r9 = socket$inet_icmp(0x2, 0x2, 0x1) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r10, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r10, 0x5441, 0x7fff) sendmmsg$unix(r0, &(0x7f0000008040)=[{{&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000080)="c79997", 0x3}, {&(0x7f0000000180)="78d55ad6cb8bf25b0210b5b6eb9ec610a6c89ccfb5e9175bdf652520bbcd468fcc40434b71f5f29bc051a1531a02389c310d1f108e16f037486c3f8fbb729f18cc22ef9e82a2a6752ec7c011bd6a4de45087fd2234ed4de4b441a2763bca281755cddf5bcbd4bab1c3fc6f5cffbe436335ecde27d2292c88e9def56280649e24daec00833a55daf075c05e2929427fa7eb54a15071a5dcbfca47d4d1a72f37b0bb3d1a5086c49b9d76cc032afb63dba3", 0xb0}], 0x2, &(0x7f0000004900)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r0, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}], 0xb8, 0x20004010}}, {{&(0x7f00000049c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000005d80)=[{&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000005a40)="52181fb25b2111c2f949eade685ccaa12daea3a6c034e6d6625e0eac6ae2ad15de48bff3bab8af91a4d052e9072ccb4d1e5d896be5e882c4437f06f4d06fd7b8d73859b4fd9b75a6822a27aff1ce6da5cb3d0348038b21569ada5b0cc427a6d4f2411937ca3b54476c835c3dd3fbb2091eb22423a78330d0dba4f760e0ced019c58559ddfd255f4a99241ccffb7f26789448757886f79557cd5d1e7ae2e89d83eace027661db3dbf512eb99816387ddc4a9f6c36ebc76645780d964482138d4ecd411e192990be539a6ba4d04f", 0xcd}, {&(0x7f0000005b40)="8e88cc7286c8bd8314b2988b8ecf25f049037b40dfdbe73f7d4db3b66122db24e5e339145f8061d7d3925d51a553b9083843ae7cf28857c35c7359375c479c20659b643565ddfde92c47226059f0e1edea29f060b8c8e2caa81049ff689500cf3071070e1945edeb7a07c6efb7aec3b4036dabfe9fbcd9b446af52fd665b34f8c8d0", 0x82}, {&(0x7f0000005c00)="1015f10debd0d0d151243c2a6fdb27c0b62f0a30846d54843054bef650efa8557f8f33b9ad7ebd567741103a69a240d265c5ec9d16944b3bf384a61fe19d4bea421b71159827aa82ebc8a17dbf93199d69fcf18f699646ca4fc9c1e843b30270bcdc5ea3d65bd3fbf0a613a11191391b653acff22238484ae4c07d6d40189309543bace7650e3510eb698dfe8925c46ebb67d5ad177f337d86a3cdf6761d881654a39529f8ad37092b204593ebf172bf87a2b7936469a6dd03b7e84bf973de7059978e70df97bebcf751345ff323f53e52a37c9a60b371f04377e505184b7a", 0xdf}, {&(0x7f0000005d00)="6140d610c58a81801c3535f359abe1f4f4f22e080df07cfa5e4fed60257e3f09cfd26933cc8b28298711e783d289f0d20e3bf7c9382d9bf252eacd159b5ba68c91683f31d73631463306b644aa", 0x4d}], 0x5, 0x0, 0x0, 0xc0}}, {{0x0, 0x0, &(0x7f0000005ec0)=[{&(0x7f0000005e00)="295529096ba40b64bb12ac5cde78959ae75fe89d9b3d481978ef9094df810797a5bec096cbea765a6e7124bc02017b7d3dc50349e100132eceadfac5c5c53438bc4c351673e98218171bfe8603c61e16b8699ed4d103340ab43663fdd57302acbc04133432cb91621b1a0a8e9bf8ec7f635313f4c4e391c37087086ae50021dc3925cc1bc429a9", 0x87}], 0x1, &(0x7f0000005f80)=[@cred={{0x0, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38, 0x4044004}}, {{&(0x7f0000005fc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000006240)=[{&(0x7f0000006040)="61a98432a1fd6952add60366432ca18f1428498e22761de8af86d9fe565d5822280e89dc7bdb2dcd633d7035a2b23e996d360176a50ec55def4ef08a3acafb4e35add7c8ce19c2744402096fb8bda271c0f00b742c55e074abfc50f5886c0d196a9d2bba03baa9c84dd4c8f11b393ffa8bc32f1a0df2aad0fccdf8bcf760be6aa610be342f6806079d8239d32d0835be0c9cc11d68a0120858d4dab46df8adb6f57cd7e1bd698d9f15b8f5a39ec8", 0xae}, {&(0x7f0000006100)="e5dbf2d14ffb5d3b40b2b7cb1fb68cb4179ba97b76393d4174f4be3efd72f3d07ae8bfc442fd1cf1a9db94970849bfd1072f7869e2f1d46525d083ceae6669c8e5e22a36060a707ff80c24c25c2b969d08ac3951f1e109da7cc44c2cf1f65db21892d02c15dcd9ac44657345daeb5e87655ca881456b5b3b5203745e09ce4866a0f48ff5c655bd8ab09fb10cb277c91bee5336ac9868703fe342e2b943d7ebcb2f0c26b52e3e41b44dd2dcd9ec8a2d9ae9", 0xb1}, {&(0x7f00000061c0)="af276a657d0b8bed52a53ab55cef16881855046eda6630304c11752bd1f736d0519c0bd40c00fcc88ee6a88c6b702bf804ef2f5cc68ba477386df0d0b8f89f96fd3bf967417176f1b61126a68610b763c400325dd64fc18e142380cd", 0x5c}], 0x3, &(0x7f00000068c0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff, r9, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r1, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r0, r0]}}, @cred={{0x0, 0x1, 0x2, {r2, 0x0, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r3, r1, r4, r5]}}], 0x180, 0x4000040}}, {{&(0x7f0000006a40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000007c40)=[{&(0x7f00000004c0)="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", 0x173}, {&(0x7f0000006b00)="60d3b6fd0c088bc2ba1ea2d67ed250ca3b1ea5c13286c7dad347d79bfc69d453a1cd7ab7", 0x24}, {&(0x7f0000006b40)="e2013bc8a9af049205c69780569549961e187d0a4c73c646430adf9af97e2c895aab7e0843ec39329484cf2df787bd18211e975057c8a1ea8cdcccef2c06b1fd36248dad31838f8f0794bbb5084b2d3b43c54c1ed4e03475d6e2145be94e13cf454df35921efeeea2e310278112e3d27258c20535e88ac8f76f95dd5e081e6e22a89caabf1cdd7842471b200348f1f19d7c50317e3476e6eb77ddbd42f7f836977aa955bbbddd78470ba10a758484a4bd767720a857fd85707c063bd4714714dfe34ab2ac1fe1e3bc0c7834b74b51e1336cd8a210a77470c85", 0xd9}, {&(0x7f0000006c40)="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", 0x1000}], 0x4, &(0x7f0000007cc0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r1, r6, r7, r1, r0, r8]}}], 0x30, 0x8000}}, {{&(0x7f0000007d00)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000007f80)=[{&(0x7f0000007d80)="3195f03cad260e18389c9e621d84a76ec92ab050f878393fb5", 0x19}, {&(0x7f0000007dc0)="7f8dce22c22d390d477177eee8344f4626c1c9765f24e39e4e52a832bad2c9640d8a3fa75ef34fa5b8016e155dc46b", 0x2f}, {&(0x7f0000007e00)="fb26d16aabf6d5252344ff425ce4445901d165303fcca0259a7078f38612c983b7df1384dd63de1564b39209bc93c8d42dd073e927e0744a675d4d028553f01f95e04cf2600a85261512714f02beec7ad4ae3fb9dfb913f93ac4ec0268289827abc9071e0c29193a4193f36027512f6458e542b2ccb943d6d44c66288654b682f5fb25b852b8c1723bf4c3330cc7442096d3ee98b1fa2640715eff33d79bfd020b2915c6ee22ea610cf1fdd59cbd561bad6b77baa5020f0f5f85660ddf9f716de50ca3af3004eeddfaeb6fa1392bbdcdc15278bc8b57986d5f469bff9120ada9e229cd971c94fc", 0xe7}, {&(0x7f0000007f00)="aedf3fde91cbc5caa3d31b85d2dd9b6b1c1d555093f2d9b03b2dbd9c19b26da5b049768a3fa7f563507d3ad08b4ade0075c1de35c6ad1e8bfeb433b786f59805965520ee1a7e194e62522095e268fee105e520bc37", 0x55}], 0x4, &(0x7f0000000240)=[@rights={{0x76, 0x1, 0x1, [0xffffffffffffffff, r10]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xffffffffffffffff}}}], 0x58, 0xa2733699d502c195}}], 0x6, 0x912d7cbb3f52eb66) gettid() 07:20:51 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x12, 0x0) 07:20:51 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 2) 07:20:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8918, &(0x7f0000000000)={'lo\x00'}) 07:20:51 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x0) 07:20:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$EXT4_IOC_GETSTATE(r2, 0x40046629, &(0x7f0000000100)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r3, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) openat(r3, &(0x7f0000000040)='./file0\x00', 0x400242, 0x5) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:20:51 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 3) [ 802.637164] FAULT_INJECTION: forcing a failure. [ 802.637164] name failslab, interval 1, probability 0, space 0, times 0 [ 802.638267] CPU: 1 UID: 0 PID: 8551 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 802.638316] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 802.638339] Call Trace: [ 802.638349] [ 802.638367] dump_stack_lvl+0xfa/0x120 [ 802.638414] should_fail_ex+0x4d7/0x5e0 [ 802.638479] should_failslab+0xc2/0x120 [ 802.638550] __kmalloc_cache_noprof+0x6b/0x3e0 [ 802.638605] ? srso_return_thunk+0x5/0x5f [ 802.638647] ? inc_ucount+0x212/0x270 [ 802.638707] ? alloc_mnt_ns+0xcf/0x530 [ 802.638766] alloc_mnt_ns+0xcf/0x530 [ 802.638814] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 802.638883] copy_mnt_ns+0x112/0xab0 [ 802.638946] ? srso_return_thunk+0x5/0x5f [ 802.638988] ? srso_return_thunk+0x5/0x5f [ 802.639028] ? kmem_cache_alloc_noprof+0x1a7/0x3d0 [ 802.639103] create_new_namespaces+0xd6/0xaf0 [ 802.639155] ? srso_return_thunk+0x5/0x5f [ 802.639195] ? security_capable+0x2f/0x90 [ 802.639253] unshare_nsproxy_namespaces+0xc0/0x200 [ 802.639313] ksys_unshare+0x46a/0xa10 [ 802.639379] ? srso_return_thunk+0x5/0x5f [ 802.639421] ? __pfx_ksys_unshare+0x10/0x10 [ 802.639490] ? ksys_write+0x1b1/0x240 [ 802.639575] __x64_sys_unshare+0x31/0x40 [ 802.639645] do_syscall_64+0xbf/0x1d0 [ 802.639695] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 802.639747] RIP: 0033:0x7f119793ab19 [ 802.639774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 802.639815] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 802.639853] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 802.639881] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 802.639908] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 802.639934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 802.639960] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 802.640016] 07:20:51 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0xe0000001}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x80000) ioctl$FIONCLEX(r3, 0x5450) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f0000000240)={{r2}, "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"}) r4 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000000104050000002e50f447a6b3eed100050800034056a6ab95"], 0x1c}, 0x1, 0x0, 0x0, 0x2000080d}, 0x20004820) lseek(r4, 0x0, 0x3) dup3(r4, r1, 0x80000) 07:20:51 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 1) 07:20:51 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x14, 0x0) [ 802.813540] lo: entered promiscuous mode [ 802.813953] lo: entered allmulticast mode [ 802.826680] FAULT_INJECTION: forcing a failure. [ 802.826680] name failslab, interval 1, probability 0, space 0, times 0 [ 802.827722] CPU: 1 UID: 0 PID: 8557 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 802.827773] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 802.827796] Call Trace: [ 802.827806] [ 802.827820] dump_stack_lvl+0xfa/0x120 [ 802.827868] should_fail_ex+0x4d7/0x5e0 [ 802.827934] ? create_new_namespaces+0x30/0xaf0 [ 802.827986] should_failslab+0xc2/0x120 [ 802.828057] kmem_cache_alloc_noprof+0x60/0x3d0 [ 802.828134] create_new_namespaces+0x30/0xaf0 [ 802.828195] ? srso_return_thunk+0x5/0x5f [ 802.828239] ? security_capable+0x2f/0x90 [ 802.828297] unshare_nsproxy_namespaces+0xc0/0x200 [ 802.828361] ksys_unshare+0x46a/0xa10 [ 802.828427] ? srso_return_thunk+0x5/0x5f [ 802.828470] ? __pfx_ksys_unshare+0x10/0x10 [ 802.828539] ? ksys_write+0x1b1/0x240 [ 802.828621] __x64_sys_unshare+0x31/0x40 [ 802.828688] do_syscall_64+0xbf/0x1d0 [ 802.828738] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 802.828791] RIP: 0033:0x7f4b4b4c4b19 [ 802.828818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 802.828859] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 802.828897] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 802.828926] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 802.828952] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 802.828979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 802.829005] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 802.829061] 07:20:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8919, &(0x7f0000000000)={'lo\x00'}) 07:21:10 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x15, 0x0) 07:21:10 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x891a, &(0x7f0000000000)={'lo\x00'}) 07:21:10 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x80000, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0)}}, 0x0, 0x0, r0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000100)=0xc) syz_open_procfs(r2, &(0x7f0000000140)='uid_map\x00') 07:21:10 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xdc800, 0xd4, &(0x7f0000000200)=[{&(0x7f0000010000)="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"/1408, 0x580, 0x8000}, {&(0x7f0000010600)="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"/1408, 0x580, 0x8800}, {&(0x7f0000010c00)="ff43443030310100"/32, 0x20, 0x9000}, {&(0x7f0000010d00)="0042454130310100"/32, 0x20, 0x9800}, {&(0x7f0000010e00)="004e535230320100"/32, 0x20, 0xa000}, {&(0x7f0000010f00)="0054454130310100"/32, 0x20, 0xa800}, {&(0x7f0000011000)="010002007c000000d890f001200000000000000000000000084344524f4d000000000000000000000000000000000000000000000000000601000100020002000100000001000000083546363732343232303030303132454500000000000000", 0x60, 0x10000}, {&(0x7f0000011100)="0000000000000011004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f6465", 0x60, 0x100c0}, {&(0x7f0000011200)="0000000000000000000000000000000000000000000000007810e40709140b2a3a000000002a67656e69736f696d61676500"/64, 0x40, 0x10160}, {&(0x7f0000011300)="04000200e60000001faff0012100000001000000002a554446204c5620496e666f00000000000000000000000201000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084344524f4d000000000000", 0x80, 0x10800}, {&(0x7f0000011400)="000000000000000000000000000000000000000600"/32, 0x20, 0x108e0}, {&(0x7f0000011500)='\x00*genisoimage\x00'/32, 0x20, 0x10960}, {&(0x7f0000011600)="0500020062000000a8a0f001220000000200000001000000022b4e5352303200", 0x20, 0x11000}, {&(0x7f0000011700)="000000000000000000000000000000000000000000000000010000000101000022000000002a67656e69736f696d61676500"/64, 0x40, 0x110a0}, {&(0x7f0000011800)="060002004f0000006411ae012300000003000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084344204f4d000000000000", 0x60, 0x11800}, {&(0x7f0000011900)="000000000000000000000000000000000000000600080000002a4f5354412055444620436f6d706c69616e74000000000201030000000000001000000000000000000000000000000600000001000000002a67656e69736f696d616765000000", 0x60, 0x118c0}, {&(0x7f0000011a00)="0000000000000000000000000000000000100000400000000106010000000000", 0x20, 0x119a0}, {&(0x7f0000011b00)="07000200b10000006d0f0800240000000400"/32, 0x20, 0x12000}, {&(0x7f0000011c00)="08000200200000000000f0012500"/32, 0x20, 0x12800}, {&(0x7f0000011d00)="010002005d0000006fcaf001300000000000000000000000084344524f4d000000000000000000000000000000000000000000000000000601000100020002000100000001000000083546363732343232303030303133323500000000000000", 0x60, 0x18000}, {&(0x7f0000011e00)="0000000000000011004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f6465", 0x60, 0x180c0}, {&(0x7f0000011f00)="0000000000000000000000000000000000000000000000007810e40709140b2a3a000000002a67656e69736f696d61676500"/64, 0x40, 0x18160}, {&(0x7f0000012000)="04000200f60000001faff0013100000001000000002a554446204c5620496e666f00000000000000000000000201000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084344524f4d000000000000", 0x80, 0x18800}, {&(0x7f0000012100)="000000000000000000000000000000000000000600"/32, 0x20, 0x188e0}, {&(0x7f00000000c0)='\x00*genisoimage\x00'/32, 0x20, 0x18960}, {&(0x7f0000012300)="0500020072000000a8a0f001320000000200000001000000022b4e5352303200", 0x20, 0x19000}, {&(0x7f0000012400)="000000000000000000000000000000000000000000000000010000000101000022000000002a67656e69736f696d61676500"/64, 0x40, 0x190a0}, {&(0x7f0000012500)="060002005f0000006411ae013300000003000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084344524f4d000000000000", 0x60, 0x19800}, {&(0x7f0000012600)="000000000000000000000000000000000000000600080000002a4f5354412055444620436f6d706c69616e74000000000201030000000000001000000000000000000000000000000600000001000000002a67656e69736f696d616765000000", 0x60, 0x198c0}, {&(0x7f0000012700)="0000000000000000000000000000000000100000400000000106010000000000", 0x20, 0x199a0}, {&(0x7f0000012800)="07000200c10000006d0f0800340000000400"/32, 0x20, 0x1a000}, {&(0x7f0000012900)="08000200300000000000f0013500"/32, 0x20, 0x1a800}, {&(0x7f0000012a00)="09000200dc00000082997600400000007810e40709140b2a3a0000000100000000000000000000000d01000000000000000000000000000000000000000000000000000000000000010000002e0000000000000022000000002a67656e69736f696d61676500000000000000000000000000000000000000060000000200000002010201020100"/160, 0xa0, 0x20000}, {&(0x7f0000012b00)="080002003c0000000000f0014100"/32, 0x20, 0x20800}, {&(0x7f0000012c00)="02000200ce00000001d7f0010001000000800000200000000080000030000000", 0x20, 0x80000}, {&(0x7f0000012d00)="0001020032000000e559f001000000007810e40709140b2a3a0000000300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084344524f4d00"/128, 0x80, 0x80800}, {&(0x7f0000012e00)="00000000000000000000000000000006004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084344524f4d000000000000000000000000000000000000000000000000000600"/128, 0x80, 0x808e0}, {&(0x7f0000012f00)="0000000000000000000000000000000000080000020000000000000000000000002a4f5354412055444620436f6d706c69616e74000000000201030000000000", 0x40, 0x80980}, {&(0x7f0000013000)="08000200fc0000000000f0010100"/32, 0x20, 0x81000}, {&(0x7f0000013100)="050102008e0000007c60a8000200000000000000040000000100000400000000000030020000000000000000a51400000200000000000000080100000000000001000000000000007810e40709140b2a3a0000007810e40709140b2a3a0000007810e40709140b2a3a0000000100000000000000000000000000000000000000002a67656e69736f696d6167650000000000000000000000000000000000000000000000000000000000000008000000080100000300"/192, 0xc0, 0x81800}, {&(0x7f0000013200)="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"/288, 0x120, 0x82000}, {&(0x7f0000013400)="0501020065000000a50ca8000400000000000000040000000100000400000000000030020000000000000000a51400000100000000000000800000000000000001000000000000007810e40709140b2a3a0000007810e40709140b2a3a0000007810e40709140b2a3a0000000100000000000000000000000000000000000000002a67656e69736f696d6167650000000000000000000000000000000000000005010000000000000000000008000000800000000500"/192, 0xc0, 0x82800}, {&(0x7f0000013500)="01010200ca000000476218000500000001000a00000800000200000000000000000000000000000001010200d2000000affe1c000500000001000006000800000a000000000000000b01000000000866696c6530010102006e00000076d31c000500000001000006000800000b000000000000000c01000000000866696c6531", 0x80, 0x83000}, {&(0x7f0000013600)="050102009d00000045a2a8000600000000000000040000000100000500000000000030020000000000000000841000000100000000000000640000000000000001000000000000007810e40709140b2a3a0000007810e40709140b2a3a0000007810e40709140b2a3a0000000100000000000000000000000000000000000000002a67656e69736f696d6167650000000000000000000000000000000000000007010000000000000000000008000000640000001900"/192, 0xc0, 0x83800}, {&(0x7f0000013700)="0501020028000000442da80007000000000000000400000001000005000000000000300200000000000000008410000001000000000000000a0000000000000001000000000000007810e40709140b2a3a0000007810e40709140b2a3a0000007810e40709140b2a3a0000000100000000000000000000000000000000000000002a67656e69736f696d61676500000000000000000000000000000000000000080100000000000000000000080000000a0000001a00"/192, 0xc0, 0x84000}, {&(0x7f0000013800)="05010200010000002524a8000800000000000000040000000100000500000000000030020000000000000000841000000100000000000000282300000000000005000000000000007810e40709140b2a3a0000007810e40709140b2a3a0000007810e40709140b2a3a0000000100000000000000000000000000000000000000002a67656e69736f696d6167650000000000000000000000000000000000000009010000000000000000000008000000282300001b00"/192, 0xc0, 0x84800}, {&(0x7f0000013900)="0501020056000000207da8000900000000000000040000000100000500000000000030020000000000000000841000000100000000000000282300000000000005000000000000007810e40709140b2a3a0000007810e40709140b2a3a0000007810e40709140b2a3a0000000100000000000000000000000000000000000000002a67656e69736f696d616765000000000000000000000000000000000000000a010000000000000000000008000000282300001b00"/192, 0xc0, 0x85000}, {&(0x7f0000013a00)="050102008100000018afa8000a000000000000000400000001000005000000000000300200000000000000008410000001000000000000001a0400000000000001000000000000007810e40709140b2a3a0000007810e40709140b2a3a0000007810e40709140b2a3a0000000100000000000000000000000000000000000000002a67656e69736f696d616765000000000000000000000000000000000000000b0100000000000000000000080000001a0400002000"/192, 0xc0, 0x85800}, {&(0x7f0000013b00)="0501020039000000f690a0000b00000000000000040000000100000500000000000030020000000000000000841000000100000000000000000000000000000000000000000000007810e40709140b2a3a0000007810e40709140b2a3a0000007810e40709140b2a3a0000000100000000000000000000000000000000000000002a67656e69736f696d616765000000000000000000000000000000000000000c0100"/192, 0xc0, 0x86000}, {&(0x7f0000013c00)="01001501000001000000050016010000010046494c4530000000000000000000", 0x20, 0x86800}, {&(0x7f0000013d00)="01000000011500010000050000000116000146494c4530000000000000000000", 0x20, 0x87800}, {&(0x7f0000013e00)="010017010000010000000a0018010000010000660069006c0065003000000000", 0x20, 0x88800}, {&(0x7f0000013f00)="010000000117000100000a0000000118000100660069006c0065003000000000", 0x20, 0x89800}, {&(0x7f0000014000)="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", 0x380, 0x8a800}, {&(0x7f0000014400)="6600160100000000011600080000000008007809140b2a3a080200000100000101005252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08006600150100000000011500080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0800860021010000000001211a0400000000041a7809140b2a3a08000000010000010846494c45302e3b310041410e0254455854756e6978000052520501894e4d0a010066696c6530505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0800a800220100000000012200000000000000007809140b2a3a08000000010000010846494c45312e3b3100525205018d4e4d0a010066696c6531505824016da100000000a16d010000000000000100000000000000000000000000000000534c31010008000003746d70001573797a2d696d61676567656e393632343934303438000566696c6530000566696c653054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08000000000000", 0x200, 0x8b000}, {&(0x7f0000014600)="2200170100000000011700080000000008007809140b2a3a080200000100000101002200170100000000011700080000000008007809140b2a3a0802000001000001010134001a0100000000011a64000056000000647809140b2a3a08000000010000011200660069006c0065002e0063006f006c0064002c00180100000000011800080000000008007809140b2a3a08020000010000010a00660069006c00650030002c001b0100000000011b0a0000000000000a8709140b2a3a08000000010000010a00660069006c00650031002c001c0100000900011c28230000000023287809140b2a3a08000000010000010a00660069006c00650032002c001c0100000000011c28230000000023287809140b2a3a08000000010000010a00660069006c0065003300"/320, 0x140, 0x8b800}, {&(0x7f0000014800)="2200180100000000011800080000000008007809140b2a3a080200000100000101002200170100000000011700080000000008007809140b2a3a080200000100000101012c0021010000000001211a0400000000041a7809140b2a3a08000000010000010a00660069006c00650030002c00220100000000012200000000000000007809140b2a3a08000000010000010a00660069006c006500310000000000", 0xa0, 0x8c000}, {&(0x7f0000014900)="4552ed010a548701525249505f313939314154484520524f434b20524944474520494e5445524348414e47452050524f544f434f4c2050524f564944455320535550504f525420464f5220504f5349582046494c452053595354454d2053454d414e54494353504c4541534520434f4e544143542044495343205055424c495348455220464f522053504543494649434154494f4e20534f555243452e2020534545205055424c4953484552204944454e54494649455220494e205052494d41525920564f4c554d452044455343524950544f5220464f5220434f4e5441435420494e464f524d4154494f4e2e00"/256, 0x100, 0x8c800}, {&(0x7f0000014a00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x8d000}, {&(0x7f0000014b00)='syzkallers\x00'/32, 0x20, 0x8d800}, {&(0x7f0000014c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x90800}, {&(0x7f0000015100)="02000200f000000001d7f0012201000000800000200000000080000030000000", 0x20, 0x91000}, {&(0x7f0000015200)="02000200f100000001d7f0012301000000800000200000000080000030000000", 0x20, 0x91800}, {&(0x7f0000015300)="02000200f200000001d7f0012401000000800000200000000080000030000000", 0x20, 0x92000}, {&(0x7f0000015400)="02000200f300000001d7f0012501000000800000200000000080000030000000", 0x20, 0x92800}, {&(0x7f0000015500)="02000200f400000001d7f0012601000000800000200000000080000030000000", 0x20, 0x93000}, {&(0x7f0000015600)="02000200f500000001d7f0012701000000800000200000000080000030000000", 0x20, 0x93800}, {&(0x7f0000015700)="02000200f600000001d7f0012801000000800000200000000080000030000000", 0x20, 0x94000}, {&(0x7f0000015800)="02000200f700000001d7f0012901000000800000200000000080000030000000", 0x20, 0x94800}, {&(0x7f0000015900)="02000200f800000001d7f0012a01000000800000200000000080000030000000", 0x20, 0x95000}, {&(0x7f0000015a00)="02000200f900000001d7f0012b01000000800000200000000080000030000000", 0x20, 0x95800}, {&(0x7f0000015b00)="02000200fa00000001d7f0012c01000000800000200000000080000030000000", 0x20, 0x96000}, {&(0x7f0000015c00)="02000200fb00000001d7f0012d01000000800000200000000080000030000000", 0x20, 0x96800}, {&(0x7f0000015d00)="02000200fc00000001d7f0012e01000000800000200000000080000030000000", 0x20, 0x97000}, {&(0x7f0000015e00)="02000200fd00000001d7f0012f01000000800000200000000080000030000000", 0x20, 0x97800}, {&(0x7f0000015f00)="02000200fe00000001d7f0013001000000800000200000000080000030000000", 0x20, 0x98000}, {&(0x7f0000016000)="02e90100ff00000001d7f0013101000000800000200000000080000030000000", 0x20, 0x98800}, {&(0x7f0000016100)="020002000000000001d7f0013201000000800000200000000080000030000000", 0x20, 0x99000}, {&(0x7f0000016200)="020002000100000001d7f0013301000000800000200000000080000030000000", 0x20, 0x99800}, {&(0x7f0000016300)="020002000200000001d7f0013401000000800000200000000080000030000000", 0x20, 0x9a000}, {&(0x7f0000016400)="020002000300000001d7f0013501000000800000200000000080000030000000", 0x20, 0x9a800}, {&(0x7f0000016500)="020002000400000001d7f0013601000000800000200000000080000030000000", 0x20, 0x9b000}, {&(0x7f0000016600)="020002000500000001d7f0013701000000800000200000000080000030000000", 0x20, 0x9b800}, {&(0x7f0000016700)="020002000600000001d7f0013801000000800000200000000080000030000000", 0x20, 0x9c000}, {&(0x7f0000016800)="020002000700000001d7f0013901000000800000200000000080000030000000", 0x20, 0x9c800}, {&(0x7f0000016900)="020002000800000001d7f0013a01000000800000200000000080000030000000", 0x20, 0x9d000}, {&(0x7f0000016a00)="020002000900000001d7f0013b01000000800000200000000080000030000000", 0x20, 0x9d800}, {&(0x7f0000016b00)="020002000a00000001d7f0013c01000000800000200000000080000030000000", 0x20, 0x9e000}, {&(0x7f0000016c00)="020002000b00000001d7f0013d01000000800000200000000080000030000000", 0x20, 0x9e800}, {&(0x7f0000016d00)="020002000c00000001d7f0013e01000000800000200000000080000030000000", 0x20, 0x9f000}, {&(0x7f0000016e00)="020002000d00000001d7f0013f01000000800000200000000080000030000000", 0x20, 0x9f800}, {&(0x7f0000016f00)="020002000e00000001d7f0014001000000800000200000000080000030000000", 0x20, 0xa0000}, {&(0x7f0000017000)="020002000f00000001d7f0014101000000800000200000000080000030000000", 0x20, 0xa0800}, {&(0x7f0000017100)="020002001000000001d7f0014201000000800000200000000080000030000000", 0x20, 0xa1000}, {&(0x7f0000017200)="020002001100000001d7f0014301000000800000200000000080000030000000", 0x20, 0xa1800}, {&(0x7f0000017300)="020002001200000001d7f0014401000000800000200000000080000030000000", 0x20, 0xa2000}, {&(0x7f0000017400)="020002001300000001d7f0014501000000800000200000000080000030000000", 0x20, 0xa2800}, {&(0x7f0000017500)="020002001400000001d7f0014601000000800000200000000080000030000000", 0x20, 0xa3000}, {&(0x7f0000017600)="020002001500000001d7f0014701000000800000200000000080000030000000", 0x20, 0xa3800}, {&(0x7f0000017700)="020002001600000001d7f0014801000000800000200000000080000030000000", 0x20, 0xa4000}, {&(0x7f0000017800)="020002001700000001d7f0014901000000800000200000000080000030000000", 0x20, 0xa4800}, {&(0x7f0000017900)="020002001800000001d7f0014a01000000800000200000000080000030000000", 0x20, 0xa5000}, {&(0x7f0000017a00)="020002001900000001d7f0014b01000000800000200000000080000030000000", 0x20, 0xa5800}, {&(0x7f0000017b00)="020002001a00000001d7f0014c01000000800000200000000080000030000000", 0x20, 0xa6000}, {&(0x7f0000017c00)="020002001b00000001d7f0014d01000000800000200000000080000030000000", 0x20, 0xa6800}, {&(0x7f0000017d00)="020002001c00000001d7f0014e01000000800000200000000080000030000000", 0x20, 0xa7000}, {&(0x7f0000017e00)="020002001d00000001d7f0014f01000000800000200000000080000030000000", 0x20, 0xa7800}, {&(0x7f0000017f00)="020002001e00000001d7f0015001000000800000200000000080000030000000", 0x20, 0xa8000}, {&(0x7f0000018000)="020002001f00000001d7f0015101000000800000200000000080000030000000", 0x20, 0xa8800}, {&(0x7f0000018100)="020002002000000001d7f0015201000000800000200000000080000030000000", 0x20, 0xa9000}, {&(0x7f0000018200)="020002002100000001d7f0015301000000800000200000000080000030000000", 0x20, 0xa9800}, {&(0x7f0000018300)="020002002200000001d7f0015401000000800000200000000080000030000000", 0x20, 0xaa000}, {&(0x7f0000018400)="020002002300000001d7f0015501000000800000200000000080000030000000", 0x20, 0xaa800}, {&(0x7f0000018500)="020002002400000001d7f0015601000000800000200000000080000030000000", 0x20, 0xab000}, {&(0x7f0000018600)="020002002500000001d7f0015701000000800000200000000080000030000000", 0x20, 0xab800}, {&(0x7f0000018700)="020002002600000001d7f0015801000000800000200000000080000030000000", 0x20, 0xac000}, {&(0x7f0000018800)="020002002700000001d7f0015901000000800000200000000080000030000000", 0x20, 0xac800}, {&(0x7f0000018900)="020002002800000001d7f0015a01000000800000200000000080000030000000", 0x20, 0xad000}, {&(0x7f0000018a00)="020002002900000001d7f0015b01000000800000200000000080000030000000", 0x20, 0xad800}, {&(0x7f0000018b00)="020002002a00000001d7f0015c01000000800000200000000080000030000000", 0x20, 0xae000}, {&(0x7f0000018c00)="020002002b00000001d7f0015d01000000800000200000000080000030000000", 0x20, 0x10000000ae800}, {&(0x7f0000018d00)="020002002c00000001d7f0015e01000000800000200000000080000030000000", 0x20, 0xaf000}, {&(0x7f0000018e00)="020002002d00000001d7f0015f01000000800000200000000080000030000000", 0x20, 0xaf800}, {&(0x7f0000018f00)="020002002e00000001d7f0016001000000800000200000000080000030000000", 0x20, 0xb0000}, {&(0x7f0000019000)="020002002f00000001d7f0016101000000800000200000000080000030000000", 0x20, 0xb0800}, {&(0x7f0000019100)="020002003000000001d7f0016201000000800000200000000080000030000000", 0x20, 0xb1000}, {&(0x7f0000019200)="020002003100000001d7f0016301000000800000200000000080000030000000", 0x20, 0xb1800}, {&(0x7f0000019300)="020002003200000001d7f0016401000000800000200000000080000030000000", 0x20, 0xb2000}, {&(0x7f0000019400)="020002003300000001d7f0016501000000800000200000000080000030000000", 0x20, 0xb2800}, {&(0x7f0000019500)="020002003400000001d7f0016601000000800000200000000080000030000000", 0x20, 0xb3000}, {&(0x7f0000019600)="020002003500000001d7f0016701000000800000200000000080000030000000", 0x20, 0xb3800}, {&(0x7f0000019700)="020002003600000001d7f0016801000000800000200000000080000030000000", 0x20, 0xb4000}, {&(0x7f0000019800)="020002003700000001d7f0016901000000800000200000000080000030000000", 0x20, 0xb4800}, {&(0x7f0000019900)="020002003800000001d7f0016a01000000800000200000000080000030000000", 0x20, 0xb5000}, {&(0x7f0000019a00)="020002003900000001d7f0016b01000000800000200000000080000030000000", 0x20, 0xb5800}, {&(0x7f0000019b00)="020002003a00000001d7f0016c01000000800000200000000080000030000000", 0x20, 0xb6000}, {&(0x7f0000019c00)="020002003b00000001d7f0016d01000000800000200000000080000030000000", 0x20, 0xb6800}, {&(0x7f0000019d00)="020002003c00000001d7f0016e01000000800000200000000080000030000000", 0x20, 0xb7000}, {&(0x7f0000019e00)="020002003d00000001d7f0016f01000000800000200000000080000030000000", 0x20, 0xb7800}, {&(0x7f0000019f00)="020002003e00000001d7f0017001000000800000200000000080000030000000", 0x20, 0xb8000}, {&(0x7f000001a000)="020002003f00000001d7f0017101000000800000200000000080000030000000", 0x20, 0xb8800}, {&(0x7f000001a100)="020002004000000001d7f0017201000000800000200000000080000030000000", 0x20, 0xb9000}, {&(0x7f000001a200)="020002004100000001d7f0017301000000800000200000000080000030000000", 0x20, 0xb9800}, {&(0x7f000001a300)="020002004200000001d7f0017401000000800000200000000080000030000000", 0x20, 0xba000}, {&(0x7f000001a400)="020002004300000001d7f0017501000000800000200000000080000030000000", 0x20, 0xba800}, {&(0x7f000001a500)="020002004400000001d7f0017601000000800000200000000080000030000000", 0x20, 0xbb000}, {&(0x7f000001a600)="020002004500000001d7f0017701000000800000200000000080000030000000", 0x20, 0xbb800}, {&(0x7f000001a700)="020002004600000001d7f0017801000000800000200000000080000030000000", 0x20, 0xbc000}, {&(0x7f000001a800)="020002004700000001d7f0017901000000800000200000000080000030000000", 0x20, 0xbc800}, {&(0x7f000001a900)="020002004800000001d7f0017a01000000800000200000000080000030000000", 0x20, 0xbd000}, {&(0x7f000001aa00)="020002004900000001d7f0017b01000000800000200000000080000030000000", 0x20, 0xbd800}, {&(0x7f000001ab00)="020002004a00000001d7f0017c01000000800000200000000080000030000000", 0x20, 0xbe000}, {&(0x7f000001ac00)="020002004b00000001d7f0017d01000000800000200000000080000030000000", 0x20, 0xbe800}, {&(0x7f000001ad00)="020002004c00000001d7f0017e01000000800000200000000080000030000000", 0x20, 0xbf000}, {&(0x7f000001ae00)="020002004d00000001d7f0017f01000000800000200000000080000030000000", 0x20, 0xbf800}, {&(0x7f000001af00)="020002004e00000001d7f0018001000000800000200000000080000030000000", 0x20, 0xc0000}, {&(0x7f000001b000)="020002004f00000001d7f0018101000000800000200000000080000030000000", 0x20, 0xc0800}, {&(0x7f000001b100)="020002005000000001d7f0018201000000800000200000000080000030000000", 0x20, 0xc1000}, {&(0x7f000001b200)="020002005100000001d7f0018301000000800000200000000080000030000000", 0x20, 0xc1800}, {&(0x7f000001b300)="020002005200000001d7f0018401000000800000200000000080000030000000", 0x20, 0xc2000}, {&(0x7f000001b400)="020002005300000001d7f0018501000000800000200000000080000030000000", 0x20, 0xc2800}, {&(0x7f000001b500)="020002005400000001d7f0018601000000800000200000000080000030000000", 0x20, 0xc3000}, {&(0x7f000001b600)="020002005500000001d7f0018701000000800000200000000080000030000000", 0x20, 0xc3800}, {&(0x7f000001b700)="020002005600000001d7f0018801000000800000200000000080000030000000", 0x20, 0xc4000}, {&(0x7f000001b800)="020002005700000001d7f0018901000000800000200000000080000030000000", 0x20, 0xc4800}, {&(0x7f000001b900)="020002005800000001d7f0018a01000000800000200000000080000030000000", 0x20, 0xc5000}, {&(0x7f000001ba00)="020002005900000001d7f0018b01000000800000200000000080000030000000", 0x20, 0xc5800}, {&(0x7f000001bb00)="020002005a00000001d7f0018c01000000800000200000000080000030000000", 0x20, 0xc6000}, {&(0x7f000001bc00)="020002005b00000001d7f0018d01000000800000200000000080000030000000", 0x20, 0xc6800}, {&(0x7f000001bd00)="020002005c00000001d7f0018e01000000800000200000000080000030000000", 0x20, 0xc7000}, {&(0x7f000001be00)="020002005d00000001d7f0018f01000000800000200000000080000030000000", 0x20, 0xc7800}, {&(0x7f000001bf00)="020002005e00000001d7f0019001000000800000200000000080000030000000", 0x20, 0xc8000}, {&(0x7f000001c000)="020002005f00000001d7f0019101000000800000200000000080000030000000", 0x20, 0xc8800}, {&(0x7f000001c100)="020002006000000001d7f0019201000000800000200000000080000030000000", 0x20, 0xc9000}, {&(0x7f000001c200)="020002006100000001d7f0019301000000800000200000000080000030000000", 0x20, 0xc9800}, {&(0x7f000001c300)="020002006200000001d7f0019401000000800000200000000080000030000000", 0x20, 0xca000}, {&(0x7f0000000180)="020002006300000001d7f0019501000000800000200000000080000030000000", 0x20, 0xca800}, {&(0x7f000001c500)="020002006400000001d7f0019601000000800000200000000080000030000000", 0x20, 0xcb000}, {&(0x7f000001c600)="020002006500000001d7f0019701000000800000200000000080000030000000", 0x20, 0xcb800}, {&(0x7f000001c700)="020002006600000001d7f0019801000000800000200000000080000030000000", 0x20, 0xcc000}, {&(0x7f000001c800)="020002006700000001d7f0019901000000800000200000000080000030000000", 0x20, 0xcc800}, {&(0x7f000001c900)="020002006800000001d7f0019a01000000800000200000000080000030000000", 0x20, 0xcd000}, {&(0x7f000001ca00)="020002006900000001d7f0019b01000000800000200000000080000030000000", 0x20, 0xcd800}, {&(0x7f000001cb00)="020002006a00000001d7f0019c01000000800000200000000080000030000000", 0x20, 0xce000}, {&(0x7f000001cc00)="020002006b00000001d7f0019d01000000800000200000000080000030000000", 0x20, 0xce800}, {&(0x7f000001cd00)="020002006c00000001d7f0019e01000000800000200000000080000030000000", 0x20, 0xcf000}, {&(0x7f000001ce00)="020002006d00000001d7f0019f01000000800000200000000080000030000000", 0x20, 0xcf800}, {&(0x7f000001cf00)="020002006e00000001d7f001a001000000800000200000000080000030000000", 0x20, 0xd0000}, {&(0x7f0000000140)="020002006f00000001d7f001a101000000800000200000000080000030000000", 0x20, 0xd0800}, {&(0x7f000001d100)="020002007000000001d7f001a201000000800000200000000080000030000000", 0x20, 0xd1000}, {&(0x7f000001d200)="020002007100000001d7f001a301000000800000200000000080000030000000", 0x20, 0xd1800}, {&(0x7f000001d300)="020002007200000001d7f001a401000000800000200000000080000030000000", 0x20, 0xd2000}, {&(0x7f000001d400)="020002007300000001d7f001a501000000800000200000000080000030000000", 0x20, 0xd2800}, {&(0x7f000001d500)="020002007400000001d7f001a601000000800000200000000080000030000000", 0x20, 0xd3000}, {&(0x7f000001d600)="020002007500000001d7f001a701000000800000200000000080000030000000", 0x20, 0x7ff}, {&(0x7f000001d700)="020002007600000001d7f001a801000000800000200000000080000030000000", 0x20, 0xd4000}, {&(0x7f000001d800)="020002007700000001d7f001a901000000800000200000000080000030000000", 0x20, 0xd4800}, {&(0x7f000001d900)="020002007800000001d7f001aa01000000800000200000000080000030000000", 0x20, 0xd5000}, {&(0x7f000001da00)="020002007900000001d7f001ab01000000800000200000000080000030000000", 0x20, 0xd5800}, {&(0x7f000001db00)="020002007a00000001d7f001ac01000000800000200000000080000030000000", 0x20, 0xd6000}, {&(0x7f000001dc00)="020002007b00000001d7f001ad01000000800000200000000080000030000000", 0x20, 0xd6800}, {&(0x7f000001dd00)="020002007c00000001d7f001ae01000000800000200000000080000030000000", 0x20, 0xd7000}, {&(0x7f000001de00)="020002007d00000001d7f001af01000000800000200000000080000030000000", 0x20, 0xd7800}, {&(0x7f000001df00)="020002007e00000001d7f001b001000000800000200000000080000030000000", 0x20, 0xd8000}, {&(0x7f000001e000)="020002007f00000001d7f001b101000000800000200000000080000030000000", 0x20, 0xd8800}, {&(0x7f000001e100)="020002008000000001d7f001b201000000800000200000000080000030000000", 0x20, 0xd9000}, {&(0x7f000001e200)="020002008100000001d7f001b301000000800000200000000080000030000000", 0x20, 0xd9800}, {&(0x7f000001e300)="020002008200000001d7f001b401000000800000200000000080000030000000", 0x20, 0xda000}, {&(0x7f000001e400)="020002008300000001d7f001b501000000800000200000000080000030000000", 0x20, 0xda800}, {&(0x7f000001e500)="020002008400000001d7f001b601000000800000200000000080000030000000", 0x20, 0xdb000}, {&(0x7f000001e600)="020002008500000001d7f001b701000000800000200000000080000030000000", 0x20, 0xdb800}, {&(0x7f000001e700)="020002008600000001d7f001b801000000800000200000000080000030000000", 0x20, 0xdc000}], 0x0, &(0x7f000001e800)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x40) openat(r0, &(0x7f0000000080)='./file0\x00', 0x400280, 0x100) 07:21:10 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 2) 07:21:10 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 4) 07:21:10 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:21:10 executing program 3: lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x8, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340), 0x28001, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="0672616e733d66642c7266646e6f3d", @ANYRES32, @ANYBLOB=',wfdno=', @ANYRES32=r0]) [ 821.808863] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:21:10 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x891b, &(0x7f0000000000)={'lo\x00'}) 07:21:10 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x891c, &(0x7f0000000000)={'lo\x00'}) [ 821.928631] loop5: detected capacity change from 0 to 6888 07:21:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x7) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file2\x00', 0x141042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file2\x00', 0x141042, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) write(r3, &(0x7f0000000140)="661af5438e0848c7d4403ba1333946b0f24bc5f95a0d2b6c4ba86c7b413468ddf10f6e9fe9498f28b09035147ea06a75ef2bbbd855608d5b7f52240ca9f4de772c2e539092c18d0cba05cb6d7d6260ff35166f62c27a65866f43fd3c289bd80851facc74bf79a92611bb45c653c40f6d4529336e85b051cbadd359b03b00ef85f0a1142e1392e14ca965f6a8482f88e894", 0x91) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000240)=']', 0x1}], 0x1, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) sendfile(r4, r4, 0x0, 0x100004) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x0, 0x0, 0x0, 0xfffffffffffffffd}) ioctl$KDSKBLED(r5, 0x4b65, 0x2) r6 = open(&(0x7f00000000c0)='./file1\x00', 0x80000, 0x80) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r7, 0x40045431, &(0x7f0000000040)) r8 = ioctl$TIOCGPTPEER(r7, 0x5441, 0x7fff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, r8}, './file2\x00'}) fsconfig$FSCONFIG_SET_FD(r6, 0x5, &(0x7f0000000200)='\xa9/)\xae]!]]@&.^^{@$-\xa8*+/\x00', 0x0, r7) 07:21:10 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) getdents(0xffffffffffffffff, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:21:10 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x16, 0x0) [ 822.363270] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:21:29 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 5) 07:21:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) getdents(0xffffffffffffffff, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:21:29 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x17, 0x0) 07:21:29 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = getpid() pidfd_open(r0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x3, 0x0, 0x0, 0x7ff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='cmdline\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r2, 0x5441, 0x7fff) lseek(r2, 0x7, 0x1) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 07:21:29 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7fff) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f0000000040)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x35, 0x0, 0x0, 0x1}, {0x6}]}) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) 07:21:29 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) ioctl$PTP_PIN_GETFUNC2(r1, 0xc0603d0f, &(0x7f0000000200)={'\x00', 0xa867, 0x3}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000080)=""/109, 0x6d}, {&(0x7f0000000280)=""/235, 0xeb}], 0x2, 0x9, 0x2) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000000000)={0x9, 0x3}) 07:21:29 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 3) 07:21:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8934, &(0x7f0000000000)={'lo\x00'}) [ 841.079126] audit: type=1326 audit(1734592889.896:16): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8620 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f3137139b19 code=0x0 [ 841.171091] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 841.196093] FAULT_INJECTION: forcing a failure. [ 841.196093] name failslab, interval 1, probability 0, space 0, times 0 [ 841.198677] CPU: 0 UID: 0 PID: 8632 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 841.198775] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 841.198819] Call Trace: [ 841.198839] [ 841.198871] dump_stack_lvl+0xfa/0x120 [ 841.198971] should_fail_ex+0x4d7/0x5e0 [ 841.199116] ? alloc_vfsmnt+0x23/0x730 [ 841.199196] should_failslab+0xc2/0x120 [ 841.199344] kmem_cache_alloc_noprof+0x60/0x3d0 [ 841.199548] alloc_vfsmnt+0x23/0x730 [ 841.199660] clone_mnt+0x6c/0xd80 [ 841.199752] ? copy_mnt_ns+0x14c/0xab0 [ 841.199937] copy_tree+0x105/0x960 [ 841.200059] ? __pfx_down_write+0x10/0x10 [ 841.200179] ? srso_return_thunk+0x5/0x5f [ 841.200260] ? alloc_mnt_ns+0x337/0x530 [ 841.200396] copy_mnt_ns+0x1ae/0xab0 [ 841.200522] ? srso_return_thunk+0x5/0x5f [ 841.200610] ? srso_return_thunk+0x5/0x5f [ 841.200775] create_new_namespaces+0xd6/0xaf0 [ 841.200883] ? srso_return_thunk+0x5/0x5f [ 841.200964] ? security_capable+0x2f/0x90 [ 841.201113] unshare_nsproxy_namespaces+0xc0/0x200 [ 841.201253] ksys_unshare+0x46a/0xa10 [ 841.201374] ? srso_return_thunk+0x5/0x5f [ 841.201461] ? __pfx_ksys_unshare+0x10/0x10 [ 841.201608] ? ksys_write+0x1b1/0x240 [ 841.201816] __x64_sys_unshare+0x31/0x40 [ 841.201945] do_syscall_64+0xbf/0x1d0 [ 841.202051] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 841.202146] RIP: 0033:0x7f119793ab19 [ 841.202206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 841.202288] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 841.202364] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 841.202422] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 841.202475] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 841.202529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 841.202582] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 841.202775] [ 841.244187] FAULT_INJECTION: forcing a failure. [ 841.244187] name failslab, interval 1, probability 0, space 0, times 0 [ 841.246249] CPU: 0 UID: 0 PID: 8635 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 841.246353] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 841.246398] Call Trace: [ 841.246418] [ 841.246450] dump_stack_lvl+0xfa/0x120 [ 841.246549] should_fail_ex+0x4d7/0x5e0 [ 841.246699] should_failslab+0xc2/0x120 [ 841.246853] __kmalloc_cache_noprof+0x6b/0x3e0 [ 841.246963] ? srso_return_thunk+0x5/0x5f [ 841.247045] ? inc_ucount+0x212/0x270 [ 841.247174] ? alloc_mnt_ns+0xcf/0x530 [ 841.247322] alloc_mnt_ns+0xcf/0x530 [ 841.247419] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 841.247577] copy_mnt_ns+0x112/0xab0 [ 841.247704] ? srso_return_thunk+0x5/0x5f [ 841.247792] ? srso_return_thunk+0x5/0x5f [ 841.247873] ? kmem_cache_alloc_noprof+0x1a7/0x3d0 [ 841.248068] create_new_namespaces+0xd6/0xaf0 [ 841.248177] ? srso_return_thunk+0x5/0x5f [ 841.248258] ? security_capable+0x2f/0x90 [ 841.248406] unshare_nsproxy_namespaces+0xc0/0x200 [ 841.248546] ksys_unshare+0x46a/0xa10 [ 841.248677] ? srso_return_thunk+0x5/0x5f [ 841.248771] ? __pfx_ksys_unshare+0x10/0x10 [ 841.248918] ? ksys_write+0x1b1/0x240 [ 841.249141] __x64_sys_unshare+0x31/0x40 [ 841.249282] do_syscall_64+0xbf/0x1d0 [ 841.249395] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 841.249510] RIP: 0033:0x7f4b4b4c4b19 [ 841.249565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 841.249647] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 841.249723] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 841.249781] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 841.249834] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 841.249888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 841.249941] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 841.250128] 07:21:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x10, 0x0, 0x7fff0000}]}) ppoll(&(0x7f0000000200)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) clock_nanosleep(0x7, 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000140)) 07:21:30 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x18, 0x0) 07:21:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 4) 07:21:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8935, &(0x7f0000000000)={'lo\x00'}) 07:21:30 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 6) 07:21:30 executing program 4: ioprio_set$pid(0x1, 0x0, 0x6000) getpgrp(0xffffffffffffffff) clone3(&(0x7f0000002c00)={0x200000000, &(0x7f0000001ac0)=0xffffffffffffffff, &(0x7f0000001b00)=0x0, &(0x7f0000001b40), {0x26}, &(0x7f0000001b80)=""/44, 0x2c, &(0x7f0000001bc0)=""/4096, &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x58) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0), 0x6e, &(0x7f0000001840)=[{&(0x7f0000000340)=""/200, 0xc8}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/218, 0xda}, {&(0x7f0000001540)=""/137, 0x89}, {&(0x7f0000001600)=""/242, 0xf2}, {&(0x7f0000001700)=""/186, 0xba}, {&(0x7f00000017c0)=""/78, 0x4e}], 0x7, &(0x7f0000002e00)=ANY=[@ANYBLOB="1c00000001000000020000e55e055fdfa44100", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000007f0000017d000001000000034b6fed2b8ce76a9833738f51", @ANYRES32, @ANYBLOB="000000001c000000000000000100e3ff02000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES16], 0x58}, 0x20) fchown(r0, 0x0, 0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x18d4c0, 0x0) r4 = openat$cgroup(r3, &(0x7f0000001900)='syz0\x00', 0x200002, 0x0) lseek(r4, 0x8e, 0x4) preadv(r3, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) write$P9_RREADLINK(r3, &(0x7f0000001a40)=ANY=[@ANYBLOB="10fd03f156c7ecf989690a0099009000000000"], 0x10) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000002cc0)={0x2, 0x2, 0x8, 0xebe6, r1}) openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r5, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r5, 0x5441, 0x7fff) dup(r5) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000001a00), 0x103000, 0x0) clone3(&(0x7f0000001980)={0x60002100, &(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0), {0x22}, &(0x7f0000000100)=""/69, 0x45, &(0x7f0000000180)=""/33, &(0x7f0000001940)=[r2, 0x0], 0x2, {r6}}, 0x58) clone3(&(0x7f00000002c0)={0x10804100, 0x0, 0x0, 0x0, {0x800}, 0x0, 0x0, 0x0, &(0x7f0000000280)=[r7], 0x1}, 0x58) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000000)=0xffffffff) 07:21:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) getdents(0xffffffffffffffff, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) [ 841.823807] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:21:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8940, &(0x7f0000000000)={'lo\x00'}) 07:21:30 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x19, 0x0) 07:21:30 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 7) [ 842.032328] audit: type=1326 audit(1734592890.835:17): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8620 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f3137139b19 code=0x0 [ 842.101958] FAULT_INJECTION: forcing a failure. [ 842.101958] name failslab, interval 1, probability 0, space 0, times 0 [ 842.103820] CPU: 0 UID: 0 PID: 8661 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 842.103914] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 842.103955] Call Trace: [ 842.103974] [ 842.104003] dump_stack_lvl+0xfa/0x120 [ 842.104097] should_fail_ex+0x4d7/0x5e0 [ 842.104237] should_failslab+0xc2/0x120 [ 842.104381] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 842.104497] ? __pfx_lock_release+0x10/0x10 [ 842.104619] ? kstrdup_const+0x57/0x80 [ 842.104742] kstrdup+0x3e/0xc0 [ 842.104824] kstrdup_const+0x57/0x80 [ 842.104904] alloc_vfsmnt+0xe2/0x730 [ 842.105008] clone_mnt+0x6c/0xd80 [ 842.105093] ? copy_mnt_ns+0x14c/0xab0 [ 842.105263] copy_tree+0x105/0x960 [ 842.105376] ? __pfx_down_write+0x10/0x10 [ 842.105487] ? srso_return_thunk+0x5/0x5f [ 842.105574] ? alloc_mnt_ns+0x337/0x530 [ 842.105699] copy_mnt_ns+0x1ae/0xab0 [ 842.105816] ? srso_return_thunk+0x5/0x5f [ 842.105896] ? srso_return_thunk+0x5/0x5f [ 842.106049] create_new_namespaces+0xd6/0xaf0 [ 842.106149] ? srso_return_thunk+0x5/0x5f [ 842.106224] ? security_capable+0x2f/0x90 [ 842.106362] unshare_nsproxy_namespaces+0xc0/0x200 [ 842.106492] ksys_unshare+0x46a/0xa10 [ 842.106613] ? srso_return_thunk+0x5/0x5f [ 842.106700] ? __pfx_ksys_unshare+0x10/0x10 [ 842.106835] ? ksys_write+0x1b1/0x240 [ 842.107043] __x64_sys_unshare+0x31/0x40 [ 842.107173] do_syscall_64+0xbf/0x1d0 [ 842.107278] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 842.107374] RIP: 0033:0x7f119793ab19 [ 842.107424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 842.107499] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 842.107570] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 842.107622] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 842.107671] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 842.107721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 842.107769] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 842.107946] 07:21:31 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1a, 0x0) 07:21:31 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 5) [ 842.339640] FAULT_INJECTION: forcing a failure. [ 842.339640] name failslab, interval 1, probability 0, space 0, times 0 [ 842.341783] CPU: 0 UID: 0 PID: 8675 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 842.341873] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 842.341913] Call Trace: [ 842.341933] [ 842.341962] dump_stack_lvl+0xfa/0x120 [ 842.342055] should_fail_ex+0x4d7/0x5e0 [ 842.342191] ? alloc_vfsmnt+0x23/0x730 [ 842.342265] should_failslab+0xc2/0x120 [ 842.342410] kmem_cache_alloc_noprof+0x60/0x3d0 [ 842.342592] alloc_vfsmnt+0x23/0x730 [ 842.342695] clone_mnt+0x6c/0xd80 [ 842.342781] ? copy_mnt_ns+0x14c/0xab0 [ 842.342952] copy_tree+0x105/0x960 [ 842.343065] ? __pfx_down_write+0x10/0x10 [ 842.343176] ? srso_return_thunk+0x5/0x5f [ 842.343251] ? alloc_mnt_ns+0x337/0x530 [ 842.343377] copy_mnt_ns+0x1ae/0xab0 [ 842.343494] ? srso_return_thunk+0x5/0x5f [ 842.343574] ? srso_return_thunk+0x5/0x5f [ 842.343726] create_new_namespaces+0xd6/0xaf0 [ 842.343827] ? srso_return_thunk+0x5/0x5f [ 842.343901] ? security_capable+0x2f/0x90 [ 842.344039] unshare_nsproxy_namespaces+0xc0/0x200 [ 842.344180] ksys_unshare+0x46a/0xa10 [ 842.344303] ? srso_return_thunk+0x5/0x5f [ 842.344389] ? __pfx_ksys_unshare+0x10/0x10 [ 842.344524] ? ksys_write+0x1b1/0x240 [ 842.344733] __x64_sys_unshare+0x31/0x40 [ 842.344862] do_syscall_64+0xbf/0x1d0 [ 842.344968] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 842.345063] RIP: 0033:0x7f4b4b4c4b19 [ 842.345114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 842.345189] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 842.345259] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 842.345314] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 842.345365] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 842.345415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 842.345463] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 842.345656] 07:21:31 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 6) 07:21:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8941, &(0x7f0000000000)={'lo\x00'}) 07:21:31 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 8) 07:21:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7fff) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f0000000040)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x35, 0x0, 0x0, 0x1}, {0x6}]}) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 842.827765] audit: type=1326 audit(1734592891.646:18): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8681 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f3137139b19 code=0x0 07:21:49 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1b, 0x0) 07:21:49 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 7) 07:21:49 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000180)=0xff, 0x4) sendmsg$inet(r0, &(0x7f0000001640)={&(0x7f0000000200)={0x2, 0x4e26, @local}, 0x10, 0x0}, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0x3f}, @mcast1, @mcast2, 0x9, 0x6, 0x2, 0x500, 0x2, 0x1000188}) 07:21:49 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 9) 07:21:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r2, r1, 0x0, 0xfffffdef) 07:21:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x894c, &(0x7f0000000000)={'lo\x00'}) 07:21:49 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:21:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100040000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="00ac8397bfd1ed954808126787f852f90401ca443854d5a42ba927629f6b7ca3f2787568c947f8ac331b9e88a0174dbb8ee0569d9d2eb42b379bf9dcdf44ca17da2c35eab566fa516c19c8e8db749272c6451a8b29000f4994200978ec09719bb5b1153025f5b4d5c489313a65772082ed546ff38ef33a1a2b5c51f3a6a0efbb5568f78c2f1747f6836bb16d31082e0091c0ba8b0ba2c74e8aed75209f0413a6a21045ed4925dc8a576022be1db8b244c5e6d5446321dedc8e0a4b84c44ef055f7480b2d3d3591fe03c848a189f1d8287e4e2f4609009e2ba16d0263f8ec27431d1a266f04"]) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x4000000) [ 860.736857] FAULT_INJECTION: forcing a failure. [ 860.736857] name failslab, interval 1, probability 0, space 0, times 0 [ 860.737902] CPU: 1 UID: 0 PID: 8695 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 860.737950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 860.737973] Call Trace: [ 860.737984] [ 860.737998] dump_stack_lvl+0xfa/0x120 [ 860.738045] should_fail_ex+0x4d7/0x5e0 [ 860.738110] should_failslab+0xc2/0x120 [ 860.738188] __kmalloc_node_noprof+0xbb/0x4a0 [ 860.738250] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 860.738304] ? alloc_slab_obj_exts+0x35/0x90 [ 860.738373] alloc_slab_obj_exts+0x35/0x90 [ 860.738428] new_slab+0xff/0x2e0 [ 860.738485] ___slab_alloc+0x89c/0x11d0 [ 860.738538] ? alloc_vfsmnt+0x23/0x730 [ 860.738587] ? __pfx_lock_release+0x10/0x10 [ 860.738644] ? srso_return_thunk+0x5/0x5f [ 860.738685] ? lock_is_held_type+0x9e/0x120 [ 860.738768] ? alloc_vfsmnt+0x23/0x730 [ 860.738809] ? kmem_cache_alloc_noprof+0x228/0x3d0 [ 860.738868] ? srso_return_thunk+0x5/0x5f [ 860.738908] kmem_cache_alloc_noprof+0x228/0x3d0 [ 860.738984] alloc_vfsmnt+0x23/0x730 [ 860.739031] clone_mnt+0x6c/0xd80 [ 860.739077] ? copy_mnt_ns+0x14c/0xab0 [ 860.739153] copy_tree+0x105/0x960 [ 860.739212] ? __pfx_down_write+0x10/0x10 [ 860.739263] ? srso_return_thunk+0x5/0x5f [ 860.739303] ? alloc_mnt_ns+0x337/0x530 [ 860.739360] copy_mnt_ns+0x1ae/0xab0 [ 860.739422] ? srso_return_thunk+0x5/0x5f [ 860.739464] ? srso_return_thunk+0x5/0x5f [ 860.739523] create_new_namespaces+0xd6/0xaf0 [ 860.739576] ? srso_return_thunk+0x5/0x5f [ 860.739616] ? security_capable+0x2f/0x90 [ 860.739675] unshare_nsproxy_namespaces+0xc0/0x200 [ 860.739735] ksys_unshare+0x46a/0xa10 [ 860.739801] ? srso_return_thunk+0x5/0x5f [ 860.739844] ? __pfx_ksys_unshare+0x10/0x10 [ 860.739913] ? ksys_write+0x1b1/0x240 [ 860.739997] __x64_sys_unshare+0x31/0x40 [ 860.740065] do_syscall_64+0xbf/0x1d0 [ 860.740114] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 860.740166] RIP: 0033:0x7f4b4b4c4b19 [ 860.740194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 860.740234] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 860.740272] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 860.740300] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 860.740327] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 860.740353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 860.740379] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 860.740437] [ 860.770240] loop5: detected capacity change from 0 to 264192 [ 860.798095] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 860.799026] EXT4-fs (loop5): group descriptors corrupted! [ 860.807315] loop4: detected capacity change from 0 to 40 [ 860.809722] loop5: detected capacity change from 0 to 264192 [ 860.814248] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 860.815138] EXT4-fs (loop5): group descriptors corrupted! 07:21:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x103242, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x20a000, 0x101) 07:21:49 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 8) [ 861.040825] syz-executor.4: attempt to access beyond end of device [ 861.040825] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 07:22:06 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:22:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r2, r1, 0x0, 0xfffffdef) 07:22:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8953, &(0x7f0000000000)={'lo\x00'}) 07:22:06 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 10) 07:22:06 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 9) 07:22:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r2, r1, 0x0, 0xfffffdef) 07:22:06 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000b80)='attr/fscreate\x00') r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r3, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r4, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r5, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r5) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000d00)={&(0x7f0000000bc0), 0xc, &(0x7f0000000cc0)={&(0x7f0000000940)={0x34, 0x0, 0x400, 0x0, 0x0, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1ff}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000884}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r6, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x1c}}, 0x54) r7 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) recvmsg(r0, &(0x7f0000000900)={&(0x7f0000000240)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000002c0)=""/193, 0xc1}, {&(0x7f00000003c0)=""/94, 0x5e}, {&(0x7f0000000180)=""/24, 0x18}, {&(0x7f0000000440)=""/229, 0xe5}, {&(0x7f0000000540)=""/65, 0x41}, {&(0x7f0000000600)=""/99, 0x63}, {&(0x7f0000000680)=""/183, 0xb7}, {&(0x7f0000000740)=""/90, 0x5a}], 0x8, &(0x7f0000000840)=""/139, 0x8b}, 0x10000) ioctl$BTRFS_IOC_SPACE_INFO(r0, 0xc0109414, &(0x7f0000000d40)={0x98d, 0xffff, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) preadv(r7, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000140), r7) 07:22:06 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1c, 0x0) [ 877.457887] FAULT_INJECTION: forcing a failure. [ 877.457887] name failslab, interval 1, probability 0, space 0, times 0 [ 877.458933] CPU: 1 UID: 0 PID: 8726 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 877.458981] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 877.459004] Call Trace: [ 877.459015] [ 877.459029] dump_stack_lvl+0xfa/0x120 [ 877.459076] should_fail_ex+0x4d7/0x5e0 [ 877.459139] ? alloc_vfsmnt+0x23/0x730 [ 877.459180] should_failslab+0xc2/0x120 [ 877.459250] kmem_cache_alloc_noprof+0x60/0x3d0 [ 877.459328] alloc_vfsmnt+0x23/0x730 [ 877.459379] clone_mnt+0x6c/0xd80 [ 877.459427] ? srso_return_thunk+0x5/0x5f [ 877.459469] ? is_subdir+0x18f/0x390 [ 877.459517] copy_tree+0x3ba/0x960 [ 877.459596] copy_mnt_ns+0x1ae/0xab0 [ 877.459658] ? srso_return_thunk+0x5/0x5f [ 877.459700] ? srso_return_thunk+0x5/0x5f [ 877.459759] create_new_namespaces+0xd6/0xaf0 [ 877.459812] ? srso_return_thunk+0x5/0x5f [ 877.459852] ? security_capable+0x2f/0x90 [ 877.459911] unshare_nsproxy_namespaces+0xc0/0x200 [ 877.459972] ksys_unshare+0x46a/0xa10 [ 877.460037] ? srso_return_thunk+0x5/0x5f [ 877.460080] ? __pfx_ksys_unshare+0x10/0x10 [ 877.460149] ? ksys_write+0x1b1/0x240 [ 877.460233] __x64_sys_unshare+0x31/0x40 [ 877.460301] do_syscall_64+0xbf/0x1d0 [ 877.460351] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 877.460403] RIP: 0033:0x7f119793ab19 [ 877.460430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 877.460470] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 877.460508] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 877.460537] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 877.460563] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 877.460590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 877.460616] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 877.460674] [ 877.603145] loop5: detected capacity change from 0 to 40 [ 877.604781] loop4: detected capacity change from 0 to 40 07:22:06 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 11) 07:22:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8955, &(0x7f0000000000)={'lo\x00'}) 07:22:06 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) [ 877.952079] syz-executor.5: attempt to access beyond end of device [ 877.952079] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 07:22:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8982, &(0x7f0000000000)={'lo\x00'}) 07:22:06 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 10) [ 878.051969] FAULT_INJECTION: forcing a failure. [ 878.051969] name failslab, interval 1, probability 0, space 0, times 0 [ 878.053837] CPU: 0 UID: 0 PID: 8756 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 878.053926] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 878.053968] Call Trace: [ 878.053986] [ 878.054015] dump_stack_lvl+0xfa/0x120 [ 878.054109] should_fail_ex+0x4d7/0x5e0 [ 878.054244] ? alloc_vfsmnt+0x23/0x730 [ 878.054318] should_failslab+0xc2/0x120 [ 878.054462] kmem_cache_alloc_noprof+0x60/0x3d0 [ 878.054644] alloc_vfsmnt+0x23/0x730 [ 878.054747] clone_mnt+0x6c/0xd80 [ 878.054855] ? srso_return_thunk+0x5/0x5f [ 878.054931] ? is_subdir+0x18f/0x390 [ 878.055039] copy_tree+0x3ba/0x960 [ 878.055236] copy_mnt_ns+0x1ae/0xab0 [ 878.055353] ? srso_return_thunk+0x5/0x5f [ 878.055434] ? srso_return_thunk+0x5/0x5f [ 878.055586] create_new_namespaces+0xd6/0xaf0 [ 878.055687] ? srso_return_thunk+0x5/0x5f [ 878.055761] ? security_capable+0x2f/0x90 [ 878.055899] unshare_nsproxy_namespaces+0xc0/0x200 [ 878.056029] ksys_unshare+0x46a/0xa10 [ 878.056150] ? srso_return_thunk+0x5/0x5f [ 878.056237] ? __pfx_ksys_unshare+0x10/0x10 [ 878.056372] ? ksys_write+0x1b1/0x240 [ 878.056581] __x64_sys_unshare+0x31/0x40 [ 878.056710] do_syscall_64+0xbf/0x1d0 [ 878.056816] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 878.056911] RIP: 0033:0x7f4b4b4c4b19 [ 878.056962] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 878.057037] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 878.057108] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 878.057160] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 878.057209] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 878.057259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 878.057307] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 878.057484] 07:22:06 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1d, 0x0) [ 878.162146] syz-executor.4: attempt to access beyond end of device [ 878.162146] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 07:22:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 12) 07:22:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r2, r1, 0x0, 0xfffffdef) [ 878.378833] FAULT_INJECTION: forcing a failure. [ 878.378833] name failslab, interval 1, probability 0, space 0, times 0 [ 878.379902] CPU: 1 UID: 0 PID: 8770 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 878.379951] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 878.379974] Call Trace: [ 878.379984] [ 878.379998] dump_stack_lvl+0xfa/0x120 [ 878.380046] should_fail_ex+0x4d7/0x5e0 [ 878.380111] should_failslab+0xc2/0x120 [ 878.380182] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 878.380245] ? __pfx_lock_release+0x10/0x10 [ 878.380304] ? kstrdup_const+0x57/0x80 [ 878.380359] kstrdup+0x3e/0xc0 [ 878.380398] kstrdup_const+0x57/0x80 [ 878.380437] alloc_vfsmnt+0xe2/0x730 [ 878.380485] clone_mnt+0x6c/0xd80 [ 878.380533] ? srso_return_thunk+0x5/0x5f [ 878.380574] ? is_subdir+0x18f/0x390 [ 878.380622] copy_tree+0x3ba/0x960 [ 878.380701] copy_mnt_ns+0x1ae/0xab0 [ 878.380764] ? srso_return_thunk+0x5/0x5f [ 878.380805] ? srso_return_thunk+0x5/0x5f [ 878.380864] create_new_namespaces+0xd6/0xaf0 [ 878.380917] ? srso_return_thunk+0x5/0x5f [ 878.380957] ? security_capable+0x2f/0x90 [ 878.381016] unshare_nsproxy_namespaces+0xc0/0x200 [ 878.381077] ksys_unshare+0x46a/0xa10 [ 878.381143] ? srso_return_thunk+0x5/0x5f [ 878.381186] ? __pfx_ksys_unshare+0x10/0x10 [ 878.381255] ? ksys_write+0x1b1/0x240 [ 878.381339] __x64_sys_unshare+0x31/0x40 [ 878.381407] do_syscall_64+0xbf/0x1d0 [ 878.381457] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 878.381509] RIP: 0033:0x7f119793ab19 [ 878.381537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 878.381577] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 878.381616] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 878.381644] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 878.381670] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 878.381697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 878.381723] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 878.381781] [ 878.410240] loop5: detected capacity change from 0 to 40 [ 878.550783] syz-executor.5: attempt to access beyond end of device [ 878.550783] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 07:22:25 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:22:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r2, r1, 0x0, 0xfffffdef) 07:22:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r2, r1, 0x0, 0xfffffdef) 07:22:25 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 11) 07:22:25 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1e, 0x0) 07:22:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8983, &(0x7f0000000000)={'lo\x00'}) 07:22:25 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 13) 07:22:25 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) r1 = socket$packet(0x11, 0x0, 0x300) bind$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x2, &(0x7f0000000100)="631741fd1794a6e3e56047fa7137e2f04fdbc8d11b71fdeae4e95a30f81c200e3445c7ba28373b6584ce685f824cac4c6a6a690755c09acb8fcff343db3c70b79e3db5025d714d6d7354b91a76f2e3df4746cefcf4ee1a18b8dffd2a88150b479a50a71f658b549ccc928798b3a257d18299c052f0a082932117d166f8994fa0eeb3f31f36a227c31c9c2d325755455bf84be1309d53082dee63ed", 0x9b) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f00000000c0)=0x401, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r4, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000280)={'wlan1\x00'}) bind$packet(r2, &(0x7f0000000000)={0x11, 0x4, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) r6 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r6, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000200)={0x1, 0x1}, 0x4) syz_emit_ethernet(0x92, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x0) [ 896.834466] loop4: detected capacity change from 0 to 40 [ 896.835170] loop5: detected capacity change from 0 to 40 07:22:25 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x21, 0x0) [ 897.039404] syz-executor.5: attempt to access beyond end of device [ 897.039404] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 897.089890] syz-executor.4: attempt to access beyond end of device [ 897.089890] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 07:22:42 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 14) 07:22:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a0, &(0x7f0000000000)={'lo\x00'}) 07:22:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:22:42 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x22, 0x0) 07:22:42 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 12) 07:22:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r2, r1, 0x0, 0xfffffdef) 07:22:42 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x7c01, 0x401a012, r1, 0x0) perf_event_open(&(0x7f0000000000)={0x7, 0x80, 0x4, 0x2, 0xf7, 0x3, 0x0, 0x3, 0x9003, 0x5, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0xb3, 0xdf92}, 0xc021, 0x1000, 0x7, 0x5, 0x0, 0x2, 0xfff, 0x0, 0x5, 0x0, 0xff}, 0x0, 0x6, r0, 0x2) 07:22:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) [ 913.687285] loop4: detected capacity change from 0 to 40 [ 913.688991] loop5: detected capacity change from 0 to 40 [ 913.746006] FAULT_INJECTION: forcing a failure. [ 913.746006] name failslab, interval 1, probability 0, space 0, times 0 [ 913.747924] CPU: 1 UID: 0 PID: 8821 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 913.748030] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 913.748100] Call Trace: [ 913.748122] [ 913.748152] dump_stack_lvl+0xfa/0x120 [ 913.748251] should_fail_ex+0x4d7/0x5e0 [ 913.748398] should_failslab+0xc2/0x120 [ 913.748552] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 913.748689] ? __pfx_lock_release+0x10/0x10 [ 913.748819] ? kstrdup_const+0x57/0x80 [ 913.748929] kstrdup+0x3e/0xc0 [ 913.749014] kstrdup_const+0x57/0x80 [ 913.749102] alloc_vfsmnt+0xe2/0x730 [ 913.749204] clone_mnt+0x6c/0xd80 [ 913.749312] ? srso_return_thunk+0x5/0x5f [ 913.749401] ? is_subdir+0x18f/0x390 [ 913.749506] copy_tree+0x3ba/0x960 [ 913.749680] copy_mnt_ns+0x1ae/0xab0 [ 913.749819] ? srso_return_thunk+0x5/0x5f [ 913.749911] ? srso_return_thunk+0x5/0x5f [ 913.750040] create_new_namespaces+0xd6/0xaf0 [ 913.750155] ? srso_return_thunk+0x5/0x5f [ 913.750244] ? security_capable+0x2f/0x90 [ 913.750371] unshare_nsproxy_namespaces+0xc0/0x200 [ 913.750506] ksys_unshare+0x46a/0xa10 [ 913.750650] ? srso_return_thunk+0x5/0x5f [ 913.750745] ? __pfx_ksys_unshare+0x10/0x10 [ 913.750897] ? ksys_write+0x1b1/0x240 [ 913.751081] __x64_sys_unshare+0x31/0x40 [ 913.751231] do_syscall_64+0xbf/0x1d0 [ 913.751341] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 913.751454] RIP: 0033:0x7f4b4b4c4b19 [ 913.751514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 913.751603] RSP: 002b:00007f4b48a19188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 913.751686] RAX: ffffffffffffffda RBX: 00007f4b4b5d8020 RCX: 00007f4b4b4c4b19 [ 913.751749] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 913.751807] RBP: 00007f4b48a191d0 R08: 0000000000000000 R09: 0000000000000000 [ 913.751865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 913.751923] R13: 00007fffae08b18f R14: 00007f4b48a19300 R15: 0000000000022000 [ 913.752065] 07:22:42 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x23, 0x0) 07:22:42 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 15) [ 914.020772] syz-executor.4: attempt to access beyond end of device [ 914.020772] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 07:22:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:22:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a1, &(0x7f0000000000)={'lo\x00'}) 07:22:42 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 13) 07:22:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:22:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) sendfile(r2, r1, 0x0, 0xfffffdef) [ 914.296907] FAULT_INJECTION: forcing a failure. [ 914.296907] name failslab, interval 1, probability 0, space 0, times 0 [ 914.299030] CPU: 1 UID: 0 PID: 8830 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 914.299131] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 914.299177] Call Trace: [ 914.299198] [ 914.299227] dump_stack_lvl+0xfa/0x120 [ 914.299321] should_fail_ex+0x4d7/0x5e0 [ 914.299457] ? alloc_vfsmnt+0x23/0x730 [ 914.299541] should_failslab+0xc2/0x120 [ 914.299688] kmem_cache_alloc_noprof+0x60/0x3d0 [ 914.299813] ? srso_return_thunk+0x5/0x5f [ 914.299897] ? lock_release+0x20f/0x6f0 [ 914.300031] alloc_vfsmnt+0x23/0x730 [ 914.300141] clone_mnt+0x6c/0xd80 [ 914.300235] ? srso_return_thunk+0x5/0x5f [ 914.300325] ? srso_return_thunk+0x5/0x5f [ 914.300426] copy_tree+0x3ba/0x960 [ 914.300590] copy_mnt_ns+0x1ae/0xab0 [ 914.300720] ? srso_return_thunk+0x5/0x5f [ 914.300806] ? srso_return_thunk+0x5/0x5f [ 914.300928] create_new_namespaces+0xd6/0xaf0 [ 914.301036] ? srso_return_thunk+0x5/0x5f [ 914.301119] ? security_capable+0x2f/0x90 [ 914.301240] unshare_nsproxy_namespaces+0xc0/0x200 [ 914.301366] ksys_unshare+0x46a/0xa10 [ 914.301500] ? srso_return_thunk+0x5/0x5f [ 914.301590] ? __pfx_ksys_unshare+0x10/0x10 [ 914.301733] ? ksys_write+0x1b1/0x240 [ 914.301906] __x64_sys_unshare+0x31/0x40 [ 914.302046] do_syscall_64+0xbf/0x1d0 [ 914.302149] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 914.302256] RIP: 0033:0x7f119793ab19 [ 914.302312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 914.302396] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 914.302474] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 914.302533] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 914.302588] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 914.302643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 914.302696] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 914.302817] [ 914.347807] loop5: detected capacity change from 0 to 40 07:22:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a0, &(0x7f0000000000)={'lo\x00'}) 07:22:43 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x24, 0x0) [ 914.467621] loop4: detected capacity change from 0 to 40 07:22:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 16) [ 914.659266] syz-executor.4: attempt to access beyond end of device [ 914.659266] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 914.660504] buffer_io_error: 134 callbacks suppressed [ 914.660526] Buffer I/O error on dev loop4, logical block 10, lost async page write 07:22:43 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x79, 0x0) 07:22:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) sendfile(r2, r1, 0x0, 0xfffffdef) 07:22:43 executing program 3: unshare(0x8000000) r0 = semget$private(0x0, 0x1, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x1, 0x7]) unshare(0x48040080) semtimedop(r0, &(0x7f0000000000)=[{0x1, 0x1000, 0x800}, {0x0, 0x2, 0x1000}, {0x2, 0x6, 0x3000}, {0x2, 0x3f, 0x1800}, {0x1, 0x5, 0x1800}, {0x4, 0x44c3, 0x1000}], 0x6, &(0x7f0000000080)={0x77359400}) 07:22:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x40049409, &(0x7f0000000000)={'lo\x00'}) 07:22:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) [ 914.929115] loop4: detected capacity change from 0 to 40 [ 915.020380] syz-executor.4: attempt to access beyond end of device [ 915.020380] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 915.021508] Buffer I/O error on dev loop4, logical block 10, lost async page write 07:23:03 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 17) 07:23:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:23:03 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x7, 0x4010, r1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x40309410, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0x7fff) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r2, 0xf502, 0x0) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY_LEVEL(r3, 0x0, 0x2, &(0x7f0000000080), 0x4) 07:23:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x40086602, &(0x7f0000000000)={'lo\x00'}) 07:23:03 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x7c, 0x0) 07:23:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) sendfile(r2, r1, 0x0, 0xfffffdef) 07:23:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:23:03 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 14) [ 934.431574] FAULT_INJECTION: forcing a failure. [ 934.431574] name failslab, interval 1, probability 0, space 0, times 0 [ 934.433461] CPU: 0 UID: 0 PID: 8878 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 934.433551] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 934.433592] Call Trace: [ 934.433611] [ 934.433640] dump_stack_lvl+0xfa/0x120 [ 934.433734] should_fail_ex+0x4d7/0x5e0 [ 934.433875] should_failslab+0xc2/0x120 [ 934.434012] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 934.434128] ? __pfx_lock_release+0x10/0x10 [ 934.434251] ? kstrdup_const+0x57/0x80 [ 934.434381] kstrdup+0x3e/0xc0 [ 934.434463] kstrdup_const+0x57/0x80 [ 934.434543] alloc_vfsmnt+0xe2/0x730 [ 934.434646] clone_mnt+0x6c/0xd80 [ 934.434732] ? srso_return_thunk+0x5/0x5f [ 934.434820] ? srso_return_thunk+0x5/0x5f [ 934.434930] copy_tree+0x3ba/0x960 [ 934.435148] copy_mnt_ns+0x1ae/0xab0 [ 934.435287] ? srso_return_thunk+0x5/0x5f [ 934.435383] ? srso_return_thunk+0x5/0x5f [ 934.435563] create_new_namespaces+0xd6/0xaf0 [ 934.435683] ? srso_return_thunk+0x5/0x5f [ 934.435771] ? security_capable+0x2f/0x90 [ 934.435934] unshare_nsproxy_namespaces+0xc0/0x200 [ 934.436088] ksys_unshare+0x46a/0xa10 [ 934.436232] ? srso_return_thunk+0x5/0x5f [ 934.436334] ? __pfx_ksys_unshare+0x10/0x10 [ 934.436495] ? ksys_write+0x1b1/0x240 [ 934.436742] __x64_sys_unshare+0x31/0x40 [ 934.436909] do_syscall_64+0xbf/0x1d0 [ 934.437035] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 934.437151] RIP: 0033:0x7f119793ab19 [ 934.437211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 934.437300] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 934.437383] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 934.437446] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 934.437504] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 934.437562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 934.437619] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 934.437830] [ 934.479684] loop4: detected capacity change from 0 to 40 [ 934.493145] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 934.525888] loop5: detected capacity change from 0 to 40 07:23:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x40087602, &(0x7f0000000000)={'lo\x00'}) 07:23:03 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xf0, 0x0) 07:23:03 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 15) 07:23:03 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 18) 07:23:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:23:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x64, 0x0, 0x2, 0x70bd27, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xe86}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x10000}}]}, 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x4040080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r1) sendmsg$IEEE802154_LLSEC_DEL_KEY(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}]}, 0x28}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r3) sendmsg$IEEE802154_LLSEC_DEL_KEY(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r4, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}]}, 0x28}}, 0x0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r4, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000140), r0) close_range(r0, 0xffffffffffffffff, 0x0) [ 934.930060] syz-executor.4: attempt to access beyond end of device [ 934.930060] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 934.932521] Buffer I/O error on dev loop4, logical block 10, lost async page write [ 934.975235] FAULT_INJECTION: forcing a failure. [ 934.975235] name failslab, interval 1, probability 0, space 0, times 0 [ 934.977265] CPU: 1 UID: 0 PID: 8897 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 934.977367] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 934.977411] Call Trace: [ 934.977431] [ 934.977459] dump_stack_lvl+0xfa/0x120 [ 934.977550] should_fail_ex+0x4d7/0x5e0 [ 934.977673] ? alloc_vfsmnt+0x23/0x730 [ 934.977753] should_failslab+0xc2/0x120 [ 934.977892] kmem_cache_alloc_noprof+0x60/0x3d0 [ 934.978013] ? srso_return_thunk+0x5/0x5f [ 934.978094] ? lock_release+0x20f/0x6f0 [ 934.978224] alloc_vfsmnt+0x23/0x730 [ 934.978317] clone_mnt+0x6c/0xd80 [ 934.978408] ? srso_return_thunk+0x5/0x5f [ 934.978494] ? srso_return_thunk+0x5/0x5f [ 934.978592] copy_tree+0x3ba/0x960 [ 934.978749] copy_mnt_ns+0x1ae/0xab0 [ 934.978875] ? srso_return_thunk+0x5/0x5f [ 934.978958] ? srso_return_thunk+0x5/0x5f [ 934.979077] create_new_namespaces+0xd6/0xaf0 [ 934.979182] ? srso_return_thunk+0x5/0x5f [ 934.979262] ? security_capable+0x2f/0x90 [ 934.979378] unshare_nsproxy_namespaces+0xc0/0x200 [ 934.979499] ksys_unshare+0x46a/0xa10 [ 934.979630] ? srso_return_thunk+0x5/0x5f [ 934.979716] ? __pfx_ksys_unshare+0x10/0x10 [ 934.979854] ? ksys_write+0x1b1/0x240 [ 934.980021] __x64_sys_unshare+0x31/0x40 [ 934.980159] do_syscall_64+0xbf/0x1d0 [ 934.980258] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 934.980360] RIP: 0033:0x7f4b4b4c4b19 [ 934.980416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 934.980496] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 934.980572] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 934.980629] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 934.980682] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 934.980735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 934.980800] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 934.980917] [ 935.309611] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:23:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x401c5820, &(0x7f0000000000)={'lo\x00'}) 07:23:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:23:20 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:23:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2a, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c20100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39313833393035343700"/192, 0xc0, 0x400}, {&(0x7f0000000040)="6129ad5bbbdb533d8000000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040000c000000fbfa3094adf69b4e7516ec00000000d9f4655f000000000000000000000000000000000000000042dea841c157d144181f1f345d1edbc0f206923f18ff4d74b40770c79710a2e79cfdf7bdaa0fa61dab3f6d75a33f61a6cf7ed8a5290b22eb664f393fe58ae8cb9a", 0x95, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000004400000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x8}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000010500)="ff000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d9f4655fd9f4655fd9f4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000d9f4655fd9f4655fd9f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000020000000", 0x40, 0x2400}, {&(0x7f0000011700)="20000000d897e2e1d897e2e100000000d9f4655f00"/32, 0x20, 0x2480}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040000000", 0x40, 0x2800}, {&(0x7f0000011900)="20000000000000000000000000000000d9f4655f00"/32, 0x20, 0x2880}, {&(0x7f0000011a00)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000050000000", 0x40, 0x2c00}, {&(0x7f0000011b00)="20000000020000000000000000000000d9f4655f00"/32, 0x20, 0x2c80}, {&(0x7f0000011c00)="c041000000380000d9f4655fd9f4655fd9f4655f00000000000002004000000000000800000000000af301000400000000000000000000000700000030000000", 0x40, 0x4800}, {&(0x7f0000011d00)="20000000000000000000000000000000d9f4655f000000000000000000000000000002ea00"/64, 0x40, 0x4880}, {&(0x7f0000011e00)="ed4100003c000000d9f4655fd9f4655fd9f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000c48b648700000000000000000000000000000000000000000000000020000000d897e2e1d897e2e1d897e2e1d9f4655fd897e2e10000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x4c00}, {&(0x7f0000011f00)="ed8100001a040000d9f4655fd9f4655fd9f4655f00000000000001004000000000000800010000000af301000400000000000000000000000100000060000000000000000000000000000000000000000000000000000000000000000000000000000000c8ee3c9e00000000000000000000000000000000000000000000000020000000d897e2e1d897e2e1d897e2e1d9f4655fd897e2e10000000000000000", 0xa0, 0x5000}, {&(0x7f0000012000)="ffa1000026000000d9f4655fd9f4655fd9f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3931383339303534372f66696c65302f66696c6530000000000000000000000000000000000000000000008af507fc00000000000000000000000000000000000000000000000020000000d897e2e1d897e2e1d897e2e1d9f4655fd897e2e10000000000000000", 0xa0, 0x5400}, {&(0x7f0000012100)="ed8100000a000000d9f4655fd9f4655fd9f4655f000000000000010000000000000000100100000073797a6b616c6c6572730000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c4518baf00000000000000000000000000000000000000000000000020000000d897e2e1d897e2e1d897e2e1d9f4655fd897e2e10000000000000000000002ea040700000000000000000000000000006461746106015403000000000600000000000000786174747231000006014c0300000000060000000000000078617474723200"/256, 0x100, 0x5800}, {&(0x7f0000012200)="0000000000000000000000000000000078617474723200007861747472310000ed81000028230000d9f4655fd9f4655fd9f4655f00000000000002004000000000000800010000000af301000400000000000000000000000500000070000000000000000000000000000000000000000000000000000000000000000000000000000000e8b186cc00000000000000000000000000000000000000000000000020000000d897e2e1d897e2e1d897e2e1d9f4655fd897e2e10000000000000000", 0xc0, 0x5be0}, {&(0x7f0000012300)="ed81000064000000d9f4655fd9f4655fd9f4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c4504c7b300000000000000000000000000000000000000000000000020000000d897e2e1d897e2e1d897e2e1d9f4655fd897e2e10000000000000000000002ea04073403000000002800000000000000646174610000000000000000", 0xc0, 0x6000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00lersyzkallersyzkallersyzkallersyzkallers', 0x40, 0x63c0}, {&(0x7f0000012500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x10000}, {&(0x7f0000012600)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x18000}, {&(0x7f0000012700)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x18800}, {&(0x7f0000012800)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x19000}, {&(0x7f0000012900)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x19800}, {&(0x7f0000000140)="0000000000080000000000000000000000000000000000000000490936b16f23b21c1f743c90b158758796d5422c77ede8b34889842beceb4607ba931b79787988420ea05f0c1ac6407bfb57bd35797c3eea726e12b28f0fe10db0b25ccef4004fd6b9ddfa5460df3ff2f2f7b27e280ba85b7025f687e6199b8e2891f54bf89a5b", 0x81, 0x1a000}, {&(0x7f0000012b00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1a800}, {&(0x7f0000012c00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1b000}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x20000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x20400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x20800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x20c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x21000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x21400}, {&(0x7f0000013300)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x28000}, {&(0x7f0000013400)="0200"/32, 0x20, 0x28400}, {&(0x7f0000013500)="0300"/32, 0x20, 0x28800}, {&(0x7f0000013600)="0400"/32, 0x20, 0x28c00}, {&(0x7f0000013700)="0500"/32, 0x20, 0x29000}, {&(0x7f0000013800)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x29400}, {&(0x7f0000013900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x30000}], 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB="6cc7d20b54276255c57ebe999fe8f123587ccde4e4e612554b7e61f90978f5146621af498158623a871606695d5bdfdceae24f4f908473347b94dfa74a819b948e29c9810c068379b3388861a2263e831495afcf8acafa6102073934b0d2af7379e76a12f7e1791c3761ba69f2fcfaad6e9df47da72408be27df196dbf5a85e7b425583c03ed7f531260cb4c5a036430921b99b11a61fff24c9a4d0a66a8891b22587af383099476e9eeb8c767ce7c8d5e2f20d1eb586cfc18680fab13f6d3c2ab42e3747df115354c733797b66e1b9ed65705312610e1d85036ee8f7a8237ce80461183dafd2e61b5c2102300ba9c580aaec21b395f2b44e71b7128e408d1683de8f47ccef180671003b59346fd6317c9afed1e88107adb8035"]) getdents(r0, &(0x7f0000000600)=""/4096, 0x1000) 07:23:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r2, r1, 0x0, 0xfffffdef) 07:23:20 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 16) 07:23:20 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 19) 07:23:20 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xf9, 0x0) [ 951.659005] loop5: detected capacity change from 0 to 40 [ 951.661799] loop4: detected capacity change from 0 to 40 [ 951.726624] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:23:20 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x106, 0x0) 07:23:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x4020940d, &(0x7f0000000000)={'lo\x00'}) 07:23:20 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 17) 07:23:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:23:20 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 20) 07:23:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r2, r1, 0x0, 0xfffffdef) [ 952.262244] FAULT_INJECTION: forcing a failure. [ 952.262244] name failslab, interval 1, probability 0, space 0, times 0 [ 952.264622] CPU: 0 UID: 0 PID: 8937 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 952.264719] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 952.264763] Call Trace: [ 952.264783] [ 952.264814] dump_stack_lvl+0xfa/0x120 [ 952.264914] should_fail_ex+0x4d7/0x5e0 [ 952.265065] should_failslab+0xc2/0x120 [ 952.265212] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 952.265345] ? __pfx_lock_release+0x10/0x10 [ 952.265487] ? kstrdup_const+0x57/0x80 [ 952.265620] kstrdup+0x3e/0xc0 [ 952.265707] kstrdup_const+0x57/0x80 [ 952.265794] alloc_vfsmnt+0xe2/0x730 [ 952.265905] clone_mnt+0x6c/0xd80 [ 952.265997] ? srso_return_thunk+0x5/0x5f [ 952.266091] ? srso_return_thunk+0x5/0x5f [ 952.266210] copy_tree+0x3ba/0x960 [ 952.266422] copy_mnt_ns+0x1ae/0xab0 [ 952.266547] ? srso_return_thunk+0x5/0x5f [ 952.266634] ? srso_return_thunk+0x5/0x5f [ 952.266798] create_new_namespaces+0xd6/0xaf0 [ 952.266906] ? srso_return_thunk+0x5/0x5f [ 952.266986] ? security_capable+0x2f/0x90 [ 952.267136] unshare_nsproxy_namespaces+0xc0/0x200 [ 952.267275] ksys_unshare+0x46a/0xa10 [ 952.267405] ? srso_return_thunk+0x5/0x5f [ 952.267499] ? __pfx_ksys_unshare+0x10/0x10 [ 952.267644] ? ksys_write+0x1b1/0x240 [ 952.267867] __x64_sys_unshare+0x31/0x40 [ 952.268006] do_syscall_64+0xbf/0x1d0 [ 952.268120] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 952.268222] RIP: 0033:0x7f4b4b4c4b19 [ 952.268276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 952.268357] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 952.268432] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 952.268489] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 952.268542] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 952.268594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 952.268647] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 952.268837] [ 952.300795] loop5: detected capacity change from 0 to 40 [ 952.394511] FAULT_INJECTION: forcing a failure. [ 952.394511] name failslab, interval 1, probability 0, space 0, times 0 [ 952.396459] CPU: 0 UID: 0 PID: 8941 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 952.396554] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 952.396598] Call Trace: [ 952.396618] [ 952.396649] dump_stack_lvl+0xfa/0x120 [ 952.396748] should_fail_ex+0x4d7/0x5e0 [ 952.396893] ? alloc_vfsmnt+0x23/0x730 [ 952.396972] should_failslab+0xc2/0x120 [ 952.397119] kmem_cache_alloc_noprof+0x60/0x3d0 [ 952.397244] ? srso_return_thunk+0x5/0x5f [ 952.397332] ? lock_release+0x20f/0x6f0 [ 952.397503] alloc_vfsmnt+0x23/0x730 [ 952.397614] clone_mnt+0x6c/0xd80 [ 952.397705] ? srso_return_thunk+0x5/0x5f [ 952.397799] ? srso_return_thunk+0x5/0x5f [ 952.397917] copy_tree+0x3ba/0x960 [ 952.398128] copy_mnt_ns+0x1ae/0xab0 [ 952.398254] ? srso_return_thunk+0x5/0x5f [ 952.398340] ? srso_return_thunk+0x5/0x5f [ 952.398504] create_new_namespaces+0xd6/0xaf0 [ 952.398612] ? srso_return_thunk+0x5/0x5f [ 952.398692] ? security_capable+0x2f/0x90 [ 952.398839] unshare_nsproxy_namespaces+0xc0/0x200 [ 952.398978] ksys_unshare+0x46a/0xa10 [ 952.399108] ? srso_return_thunk+0x5/0x5f [ 952.399201] ? __pfx_ksys_unshare+0x10/0x10 [ 952.399346] ? ksys_write+0x1b1/0x240 [ 952.399570] __x64_sys_unshare+0x31/0x40 [ 952.399709] do_syscall_64+0xbf/0x1d0 [ 952.399822] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 952.399924] RIP: 0033:0x7f119793ab19 [ 952.399979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 952.400059] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 952.400135] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 952.400192] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 952.400244] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 952.400297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 952.400349] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 952.400540] [ 952.539981] loop4: detected capacity change from 0 to 40 07:23:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x80086601, &(0x7f0000000000)={'lo\x00'}) 07:23:38 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x138, 0x0) 07:23:38 executing program 3: perf_event_open(&(0x7f0000001500)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x16280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000300)={0x1e, 0x0, 0x1}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000240)='TIPCv2\x00') r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r4, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001940)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000500)={{}, r6, 0x12, @unused=[0x1, 0x1, 0x6, 0x6], @subvolid=0x80000000}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000200)={{}, r6, 0x18, @unused=[0x3ff, 0xcd0, 0x0, 0x4], @name="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"}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000140)={"af63528f24a523302c1fb03cac554957", 0x0, r6, {0x4c31, 0x1f}, {0x7, 0x7fff}, 0xff, [0x5, 0x80000001, 0x40, 0x1ff, 0x1, 0xb1, 0x9, 0x4, 0x4, 0xfffffffffffff801, 0x8, 0x4, 0x800, 0x0, 0x1, 0x81]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000040)={"8088b2f3cd94886a6edf0e98ad49da40", 0x0, r6, {0x3, 0x6}, {0x0, 0x2}, 0x9, [0x0, 0x2, 0x100000001, 0x4, 0xfffffffffffffbf7, 0x3, 0xfff, 0x3, 0x5a6c, 0x1f, 0x5, 0x54c, 0x6, 0x100000001, 0x101, 0x4]}) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f00000002c0)=r6) sendmsg$DEVLINK_CMD_RATE_DEL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000015c0)={0x94, r5, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x7fffffff}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @handle=@pci={{0x8}, {0x11}}, @handle=@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x94}, 0x1, 0x0, 0x0, 0x841}, 0x20008040) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r1, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000008900000008000300", @ANYRES32=r7, @ANYBLOB="10001d800c00d58de3664b8b453ab1c3bbd99ae06d12f5d845a015c57a"], 0x2c}}, 0x0) 07:23:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r2, r1, 0x0, 0xfffffdef) 07:23:38 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) 07:23:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:23:38 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 21) 07:23:38 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 18) [ 970.070858] loop4: detected capacity change from 0 to 40 [ 970.119292] loop5: detected capacity change from 0 to 40 07:23:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x80087601, &(0x7f0000000000)={'lo\x00'}) [ 970.208309] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:23:39 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x139, 0x0) 07:23:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 22) 07:23:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(0xffffffffffffffff, r1, 0x0, 0xfffffdef) [ 970.376608] FAULT_INJECTION: forcing a failure. [ 970.376608] name failslab, interval 1, probability 0, space 0, times 0 [ 970.377615] CPU: 1 UID: 0 PID: 8975 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 970.377664] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 970.377687] Call Trace: [ 970.377697] [ 970.377711] dump_stack_lvl+0xfa/0x120 [ 970.377760] should_fail_ex+0x4d7/0x5e0 [ 970.377826] should_failslab+0xc2/0x120 [ 970.377899] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 970.377962] ? __pfx_lock_release+0x10/0x10 [ 970.378029] ? kstrdup_const+0x57/0x80 [ 970.378081] kstrdup+0x3e/0xc0 [ 970.378119] kstrdup_const+0x57/0x80 [ 970.378159] alloc_vfsmnt+0xe2/0x730 [ 970.378207] clone_mnt+0x6c/0xd80 [ 970.378253] ? srso_return_thunk+0x5/0x5f [ 970.378298] ? srso_return_thunk+0x5/0x5f [ 970.378351] copy_tree+0x3ba/0x960 [ 970.378430] copy_mnt_ns+0x1ae/0xab0 [ 970.378494] ? srso_return_thunk+0x5/0x5f [ 970.378535] ? srso_return_thunk+0x5/0x5f [ 970.378594] create_new_namespaces+0xd6/0xaf0 [ 970.378647] ? srso_return_thunk+0x5/0x5f [ 970.378687] ? security_capable+0x2f/0x90 [ 970.378746] unshare_nsproxy_namespaces+0xc0/0x200 [ 970.378807] ksys_unshare+0x46a/0xa10 [ 970.378873] ? srso_return_thunk+0x5/0x5f [ 970.378916] ? __pfx_ksys_unshare+0x10/0x10 [ 970.378985] ? ksys_write+0x1b1/0x240 [ 970.379070] __x64_sys_unshare+0x31/0x40 [ 970.379137] do_syscall_64+0xbf/0x1d0 [ 970.379188] entry_SYSCALL_64_after_hwframe+0x77/0x7f 07:23:39 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 19) [ 970.379240] RIP: 0033:0x7f119793ab19 [ 970.379268] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 970.379309] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 970.379348] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 970.379376] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 970.379403] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 970.379429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 970.379456] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 970.379514] [ 970.436295] loop4: detected capacity change from 0 to 40 07:23:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x80108906, &(0x7f0000000000)={'lo\x00'}) 07:23:39 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x227, 0x0) 07:23:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) [ 970.788776] loop5: detected capacity change from 0 to 40 07:23:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x80108907, &(0x7f0000000000)={'lo\x00'}) 07:23:58 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 23) 07:23:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:23:58 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x2f0, 0x0) 07:23:58 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 20) 07:23:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0xfffffffe}, {0x1000}]}) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) 07:23:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(0xffffffffffffffff, r1, 0x0, 0xfffffdef) 07:23:58 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) [ 989.735437] FAULT_INJECTION: forcing a failure. [ 989.735437] name failslab, interval 1, probability 0, space 0, times 0 [ 989.737413] CPU: 0 UID: 0 PID: 8996 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 989.737503] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 989.737544] Call Trace: [ 989.737562] [ 989.737592] dump_stack_lvl+0xfa/0x120 [ 989.737684] should_fail_ex+0x4d7/0x5e0 [ 989.737819] ? alloc_vfsmnt+0x23/0x730 [ 989.737893] should_failslab+0xc2/0x120 [ 989.738029] kmem_cache_alloc_noprof+0x60/0x3d0 [ 989.738145] ? srso_return_thunk+0x5/0x5f [ 989.738220] ? lock_release+0x20f/0x6f0 [ 989.738377] alloc_vfsmnt+0x23/0x730 [ 989.738480] clone_mnt+0x6c/0xd80 [ 989.738565] ? srso_return_thunk+0x5/0x5f [ 989.738652] ? srso_return_thunk+0x5/0x5f [ 989.738774] copy_tree+0x3ba/0x960 [ 989.738971] copy_mnt_ns+0x1ae/0xab0 [ 989.739087] ? srso_return_thunk+0x5/0x5f [ 989.739168] ? srso_return_thunk+0x5/0x5f [ 989.739320] create_new_namespaces+0xd6/0xaf0 [ 989.739421] ? srso_return_thunk+0x5/0x5f [ 989.739495] ? security_capable+0x2f/0x90 [ 989.739633] unshare_nsproxy_namespaces+0xc0/0x200 [ 989.739762] ksys_unshare+0x46a/0xa10 [ 989.739901] ? __pfx_ksys_unshare+0x10/0x10 [ 989.740024] ? xfd_validate_state+0x51/0x180 [ 989.740183] ? srso_return_thunk+0x5/0x5f [ 989.740258] ? trace_x86_fpu_regs_activated+0x130/0x190 [ 989.740422] __x64_sys_unshare+0x31/0x40 [ 989.740551] do_syscall_64+0xbf/0x1d0 [ 989.740657] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 989.740752] RIP: 0033:0x7f4b4b4c4b19 [ 989.740803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 989.740878] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 989.740948] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 989.741001] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 989.741050] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 989.741099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 989.741148] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 989.741325] [ 989.801762] loop4: detected capacity change from 0 to 40 [ 989.807727] loop5: detected capacity change from 0 to 40 [ 989.962451] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:23:58 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x300, 0x0) 07:23:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:23:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x80111500, &(0x7f0000000000)={'lo\x00'}) 07:23:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 24) 07:23:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 21) 07:23:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(0xffffffffffffffff, r1, 0x0, 0xfffffdef) [ 990.370263] loop5: detected capacity change from 0 to 40 [ 990.390928] loop4: detected capacity change from 0 to 40 07:23:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 22) 07:23:59 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x480, 0x0) 07:23:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 25) 07:23:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, 0xffffffffffffffff, 0x0, 0xfffffdef) [ 990.742089] FAULT_INJECTION: forcing a failure. [ 990.742089] name failslab, interval 1, probability 0, space 0, times 0 [ 990.743825] CPU: 1 UID: 0 PID: 9028 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 990.743908] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 990.743946] Call Trace: [ 990.743963] [ 990.743987] dump_stack_lvl+0xfa/0x120 [ 990.744064] should_fail_ex+0x4d7/0x5e0 [ 990.744171] ? alloc_vfsmnt+0x23/0x730 [ 990.744240] should_failslab+0xc2/0x120 [ 990.744367] kmem_cache_alloc_noprof+0x60/0x3d0 [ 990.744471] ? srso_return_thunk+0x5/0x5f [ 990.744542] ? lock_release+0x20f/0x6f0 [ 990.744654] alloc_vfsmnt+0x23/0x730 [ 990.744734] clone_mnt+0x6c/0xd80 [ 990.744813] ? srso_return_thunk+0x5/0x5f [ 990.744887] ? srso_return_thunk+0x5/0x5f [ 990.744971] copy_tree+0x3ba/0x960 [ 990.745108] copy_mnt_ns+0x1ae/0xab0 [ 990.745216] ? srso_return_thunk+0x5/0x5f [ 990.745288] ? srso_return_thunk+0x5/0x5f [ 990.745389] create_new_namespaces+0xd6/0xaf0 [ 990.745479] ? srso_return_thunk+0x5/0x5f [ 990.745550] ? security_capable+0x2f/0x90 [ 990.745649] unshare_nsproxy_namespaces+0xc0/0x200 [ 990.745753] ksys_unshare+0x46a/0xa10 [ 990.745864] ? srso_return_thunk+0x5/0x5f [ 990.745938] ? __pfx_ksys_unshare+0x10/0x10 [ 990.746056] ? ksys_write+0x1b1/0x240 [ 990.746166] ? srso_return_thunk+0x5/0x5f [ 990.746265] __x64_sys_unshare+0x31/0x40 [ 990.746380] do_syscall_64+0xbf/0x1d0 [ 990.746465] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 990.746557] RIP: 0033:0x7f119793ab19 [ 990.746604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 990.746672] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 990.746747] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 990.746796] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 990.746841] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 990.746886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 990.746930] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 990.747030] [ 990.827064] FAULT_INJECTION: forcing a failure. [ 990.827064] name failslab, interval 1, probability 0, space 0, times 0 [ 990.829197] CPU: 0 UID: 0 PID: 9031 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 990.829295] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 990.829347] Call Trace: [ 990.829367] [ 990.829399] dump_stack_lvl+0xfa/0x120 [ 990.829501] should_fail_ex+0x4d7/0x5e0 [ 990.829655] should_failslab+0xc2/0x120 [ 990.829805] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 990.829931] ? __pfx_lock_release+0x10/0x10 [ 990.830065] ? kstrdup_const+0x57/0x80 [ 990.830200] kstrdup+0x3e/0xc0 [ 990.830290] kstrdup_const+0x57/0x80 [ 990.830378] alloc_vfsmnt+0xe2/0x730 [ 990.830492] clone_mnt+0x6c/0xd80 [ 990.830585] ? srso_return_thunk+0x5/0x5f [ 990.830681] ? srso_return_thunk+0x5/0x5f [ 990.830815] copy_tree+0x3ba/0x960 [ 990.831031] copy_mnt_ns+0x1ae/0xab0 [ 990.831159] ? srso_return_thunk+0x5/0x5f [ 990.831248] ? srso_return_thunk+0x5/0x5f [ 990.831415] create_new_namespaces+0xd6/0xaf0 [ 990.831525] ? srso_return_thunk+0x5/0x5f [ 990.831607] ? security_capable+0x2f/0x90 [ 990.831758] unshare_nsproxy_namespaces+0xc0/0x200 [ 990.831900] ksys_unshare+0x46a/0xa10 [ 990.832033] ? srso_return_thunk+0x5/0x5f [ 990.832128] ? __pfx_ksys_unshare+0x10/0x10 [ 990.832276] ? ksys_write+0x1b1/0x240 [ 990.832419] ? srso_return_thunk+0x5/0x5f [ 990.832580] __x64_sys_unshare+0x31/0x40 [ 990.832722] do_syscall_64+0xbf/0x1d0 [ 990.832838] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 990.832942] RIP: 0033:0x7f4b4b4c4b19 [ 990.832998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 990.833080] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 990.833157] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 990.833215] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 990.833269] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 990.833323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 990.833376] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 990.833571] [ 990.874770] loop4: detected capacity change from 0 to 40 07:24:20 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 23) 07:24:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x801c581f, &(0x7f0000000000)={'lo\x00'}) 07:24:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, 0xffffffffffffffff, 0x0, 0xfffffdef) 07:24:20 executing program 5: chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:24:20 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) 07:24:20 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 26) 07:24:20 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x500, 0x0) 07:24:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x49}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_SET_MCAST_RATE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r2, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x14}, @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0xa}, @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x6e}, @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x168}]}, 0x34}, 0x1, 0x0, 0x0, 0x48041}, 0x20004084) keyctl$set_reqkey_keyring(0xe, 0x1) keyctl$set_reqkey_keyring(0xe, 0x3) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r3, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0), r0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r4, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {}, {0x14, 0x19, {0x5, 0x5, 0x200, 0x29ca}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x810}, 0x804) [ 1011.787964] loop4: detected capacity change from 0 to 40 07:24:20 executing program 5: chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:24:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, 0xffffffffffffffff, 0x0, 0xfffffdef) [ 1012.086037] loop4: detected capacity change from 0 to 40 07:24:40 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_destroy(0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) 07:24:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r2, r1, 0x0, 0xfffffdef) 07:24:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x80811501, &(0x7f0000000000)={'lo\x00'}) 07:24:40 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x600, 0x0) 07:24:40 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) 07:24:40 executing program 5: chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:24:40 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 24) 07:24:40 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 27) [ 1031.664648] loop4: detected capacity change from 0 to 40 [ 1031.692849] FAULT_INJECTION: forcing a failure. [ 1031.692849] name failslab, interval 1, probability 0, space 0, times 0 [ 1031.694766] CPU: 0 UID: 0 PID: 9083 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1031.694856] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1031.694897] Call Trace: [ 1031.694916] [ 1031.694945] dump_stack_lvl+0xfa/0x120 [ 1031.695039] should_fail_ex+0x4d7/0x5e0 [ 1031.695180] should_failslab+0xc2/0x120 [ 1031.695325] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1031.695441] ? __pfx_lock_release+0x10/0x10 [ 1031.695563] ? kstrdup_const+0x57/0x80 [ 1031.695691] kstrdup+0x3e/0xc0 [ 1031.695772] kstrdup_const+0x57/0x80 [ 1031.695853] alloc_vfsmnt+0xe2/0x730 [ 1031.695956] clone_mnt+0x6c/0xd80 [ 1031.696041] ? srso_return_thunk+0x5/0x5f [ 1031.696129] ? srso_return_thunk+0x5/0x5f [ 1031.696250] copy_tree+0x3ba/0x960 [ 1031.696447] copy_mnt_ns+0x1ae/0xab0 [ 1031.696563] ? srso_return_thunk+0x5/0x5f [ 1031.696647] ? srso_return_thunk+0x5/0x5f [ 1031.696801] create_new_namespaces+0xd6/0xaf0 [ 1031.696901] ? srso_return_thunk+0x5/0x5f [ 1031.696975] ? security_capable+0x2f/0x90 [ 1031.697113] unshare_nsproxy_namespaces+0xc0/0x200 [ 1031.697242] ksys_unshare+0x46a/0xa10 [ 1031.697364] ? srso_return_thunk+0x5/0x5f [ 1031.697450] ? __pfx_ksys_unshare+0x10/0x10 [ 1031.697585] ? ksys_write+0x1b1/0x240 [ 1031.697794] __x64_sys_unshare+0x31/0x40 [ 1031.697923] do_syscall_64+0xbf/0x1d0 [ 1031.698029] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1031.698124] RIP: 0033:0x7f119793ab19 [ 1031.698175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1031.698250] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1031.698321] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1031.698373] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1031.698422] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1031.698471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1031.698520] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1031.698696] [ 1031.741662] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 07:24:40 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x601, 0x0) 07:24:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc0045878, &(0x7f0000000000)={'lo\x00'}) 07:24:40 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) [ 1032.030343] FAULT_INJECTION: forcing a failure. [ 1032.030343] name failslab, interval 1, probability 0, space 0, times 0 [ 1032.032239] CPU: 1 UID: 0 PID: 9095 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1032.032335] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1032.032376] Call Trace: [ 1032.032395] [ 1032.032421] dump_stack_lvl+0xfa/0x120 [ 1032.032504] should_fail_ex+0x4d7/0x5e0 [ 1032.032620] ? alloc_vfsmnt+0x23/0x730 [ 1032.032694] should_failslab+0xc2/0x120 [ 1032.032824] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1032.032940] ? srso_return_thunk+0x5/0x5f [ 1032.033024] ? lockdep_hardirqs_on_prepare+0x262/0x3f0 [ 1032.033155] alloc_vfsmnt+0x23/0x730 [ 1032.033242] clone_mnt+0x6c/0xd80 [ 1032.033335] ? copy_tree+0x4f9/0x960 [ 1032.033458] copy_tree+0x3ba/0x960 [ 1032.033605] copy_mnt_ns+0x1ae/0xab0 [ 1032.033722] ? srso_return_thunk+0x5/0x5f [ 1032.033800] ? srso_return_thunk+0x5/0x5f [ 1032.033909] create_new_namespaces+0xd6/0xaf0 [ 1032.034013] ? srso_return_thunk+0x5/0x5f [ 1032.034098] ? security_capable+0x2f/0x90 [ 1032.034207] unshare_nsproxy_namespaces+0xc0/0x200 [ 1032.034324] ksys_unshare+0x46a/0xa10 [ 1032.034448] ? srso_return_thunk+0x5/0x5f [ 1032.034528] ? __pfx_ksys_unshare+0x10/0x10 [ 1032.034657] ? ksys_write+0x1b1/0x240 [ 1032.034812] __x64_sys_unshare+0x31/0x40 [ 1032.034938] do_syscall_64+0xbf/0x1d0 [ 1032.035040] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1032.035137] RIP: 0033:0x7f4b4b4c4b19 [ 1032.035188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1032.035263] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1032.035333] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1032.035386] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1032.035435] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1032.035485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1032.035533] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1032.035641] 07:24:40 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 25) [ 1032.124933] loop5: detected capacity change from 0 to 40 07:24:40 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 28) 07:24:40 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 26) 07:24:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_destroy(0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) 07:24:41 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x700, 0x0) 07:24:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc0045878, &(0x7f0000000000)={'lo\x00'}) 07:24:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r2, r1, 0x0, 0xfffffdef) 07:24:41 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:24:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) [ 1032.622680] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1032.700146] loop4: detected capacity change from 0 to 40 07:24:41 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x900, 0x0) 07:24:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 29) [ 1032.752015] loop5: detected capacity change from 0 to 40 07:24:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc0189436, &(0x7f0000000000)={'lo\x00'}) 07:24:41 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 27) [ 1032.976287] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 07:25:01 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 30) 07:25:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) write(r0, &(0x7f0000000200)='E', 0x140000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r2, r1, 0x0, 0xfffffdef) 07:25:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_destroy(0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) 07:25:01 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_destroy(0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) 07:25:01 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:25:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc020660b, &(0x7f0000000000)={'lo\x00'}) 07:25:01 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 28) 07:25:01 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xf00, 0x0) [ 1052.958274] loop4: detected capacity change from 0 to 40 [ 1052.962041] loop5: detected capacity change from 0 to 40 [ 1053.014874] FAULT_INJECTION: forcing a failure. [ 1053.014874] name failslab, interval 1, probability 0, space 0, times 0 [ 1053.016731] CPU: 0 UID: 0 PID: 9152 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1053.016821] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1053.016863] Call Trace: [ 1053.016882] [ 1053.016922] dump_stack_lvl+0xfa/0x120 [ 1053.017020] should_fail_ex+0x4d7/0x5e0 [ 1053.017136] ? alloc_vfsmnt+0x23/0x730 [ 1053.017211] should_failslab+0xc2/0x120 [ 1053.017349] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1053.017464] ? srso_return_thunk+0x5/0x5f [ 1053.017540] ? lock_release+0x20f/0x6f0 [ 1053.017660] alloc_vfsmnt+0x23/0x730 [ 1053.017746] clone_mnt+0x6c/0xd80 [ 1053.017833] ? srso_return_thunk+0x5/0x5f [ 1053.017914] ? srso_return_thunk+0x5/0x5f [ 1053.018004] copy_tree+0x3ba/0x960 [ 1053.018149] copy_mnt_ns+0x1ae/0xab0 [ 1053.018268] ? srso_return_thunk+0x5/0x5f [ 1053.018350] ? srso_return_thunk+0x5/0x5f [ 1053.018458] create_new_namespaces+0xd6/0xaf0 [ 1053.018556] ? srso_return_thunk+0x5/0x5f [ 1053.018632] ? security_capable+0x2f/0x90 [ 1053.018739] unshare_nsproxy_namespaces+0xc0/0x200 [ 1053.018852] ksys_unshare+0x46a/0xa10 [ 1053.018975] ? srso_return_thunk+0x5/0x5f [ 1053.019056] ? __pfx_ksys_unshare+0x10/0x10 [ 1053.019186] ? ksys_write+0x1b1/0x240 [ 1053.019340] __x64_sys_unshare+0x31/0x40 [ 1053.019468] do_syscall_64+0xbf/0x1d0 [ 1053.019560] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1053.019657] RIP: 0033:0x7f119793ab19 [ 1053.019709] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1053.019785] RSP: 002b:00007f1194e8f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1053.019856] RAX: ffffffffffffffda RBX: 00007f1197a4e020 RCX: 00007f119793ab19 [ 1053.019909] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1053.019959] RBP: 00007f1194e8f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1053.020009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1053.020058] R13: 00007fff7720d27f R14: 00007f1194e8f300 R15: 0000000000022000 [ 1053.020163] [ 1053.022450] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1053.058759] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 07:25:22 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 29) 07:25:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:25:22 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1100, 0x0) 07:25:22 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 31) 07:25:22 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:25:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_destroy(0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) 07:25:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc4042, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:25:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000100)=0xe7, 0x4) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000100)=0xe7, 0x4) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x7fff) dup(0xffffffffffffffff) r6 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendto$packet(r5, &(0x7f0000000040)="3ddb8f929d5aec688a22", 0xa, 0x0, &(0x7f00000000c0)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r2, &(0x7f0000000040)="3ddb8f929d5aec688a22", 0xa, 0x20004010, &(0x7f00000000c0)={0x11, 0x2, r7, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) bind$packet(r1, &(0x7f0000000000)={0x11, 0x16, r4, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x26}}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 1074.137468] loop4: detected capacity change from 0 to 40 07:25:23 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1200, 0x0) [ 1074.219657] loop5: detected capacity change from 0 to 40 [ 1074.244602] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:25:23 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 30) [ 1074.300437] lo: left promiscuous mode 07:25:23 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 32) [ 1074.336569] syz-executor.4: attempt to access beyond end of device [ 1074.336569] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 1074.340093] FAULT_INJECTION: forcing a failure. [ 1074.340093] name failslab, interval 1, probability 0, space 0, times 0 [ 1074.341213] CPU: 0 UID: 0 PID: 9178 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1074.341263] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1074.341290] Call Trace: [ 1074.341301] [ 1074.341317] dump_stack_lvl+0xfa/0x120 [ 1074.341370] should_fail_ex+0x4d7/0x5e0 [ 1074.341444] ? alloc_vfsmnt+0x23/0x730 [ 1074.341485] should_failslab+0xc2/0x120 [ 1074.341559] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1074.341625] ? srso_return_thunk+0x5/0x5f [ 1074.341679] ? lock_release+0x20f/0x6f0 [ 1074.341763] alloc_vfsmnt+0x23/0x730 [ 1074.341819] clone_mnt+0x6c/0xd80 [ 1074.341865] ? srso_return_thunk+0x5/0x5f [ 1074.341912] ? srso_return_thunk+0x5/0x5f [ 1074.341971] copy_tree+0x3ba/0x960 [ 1074.342077] copy_mnt_ns+0x1ae/0xab0 [ 1074.342140] ? srso_return_thunk+0x5/0x5f [ 1074.342183] ? srso_return_thunk+0x5/0x5f [ 1074.342266] create_new_namespaces+0xd6/0xaf0 [ 1074.342321] ? srso_return_thunk+0x5/0x5f [ 1074.342361] ? security_capable+0x2f/0x90 [ 1074.342437] unshare_nsproxy_namespaces+0xc0/0x200 [ 1074.342506] ksys_unshare+0x46a/0xa10 [ 1074.342573] ? srso_return_thunk+0x5/0x5f [ 1074.342620] ? __pfx_ksys_unshare+0x10/0x10 [ 1074.342695] ? ksys_write+0x1b1/0x240 [ 1074.342812] __x64_sys_unshare+0x31/0x40 [ 1074.342881] do_syscall_64+0xbf/0x1d0 [ 1074.342939] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1074.342991] RIP: 0033:0x7f4b4b4c4b19 [ 1074.343019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1074.343059] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1074.343098] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1074.343126] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1074.343153] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1074.343179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1074.343206] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1074.343301] [ 1074.384224] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1074.385420] FAULT_INJECTION: forcing a failure. [ 1074.385420] name failslab, interval 1, probability 0, space 0, times 0 [ 1074.386494] CPU: 0 UID: 0 PID: 9182 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1074.386542] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1074.386564] Call Trace: [ 1074.386575] [ 1074.386590] dump_stack_lvl+0xfa/0x120 [ 1074.386641] should_fail_ex+0x4d7/0x5e0 [ 1074.386718] should_failslab+0xc2/0x120 [ 1074.386792] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1074.386855] ? __pfx_lock_release+0x10/0x10 [ 1074.386922] ? kstrdup_const+0x57/0x80 [ 1074.386988] kstrdup+0x3e/0xc0 [ 1074.387032] kstrdup_const+0x57/0x80 [ 1074.387076] alloc_vfsmnt+0xe2/0x730 [ 1074.387132] clone_mnt+0x6c/0xd80 [ 1074.387178] ? srso_return_thunk+0x5/0x5f [ 1074.387225] ? srso_return_thunk+0x5/0x5f [ 1074.387289] copy_tree+0x3ba/0x960 [ 1074.387395] copy_mnt_ns+0x1ae/0xab0 [ 1074.387458] ? srso_return_thunk+0x5/0x5f [ 1074.387502] ? srso_return_thunk+0x5/0x5f [ 1074.387584] create_new_namespaces+0xd6/0xaf0 [ 1074.387639] ? srso_return_thunk+0x5/0x5f [ 1074.387679] ? security_capable+0x2f/0x90 [ 1074.387753] unshare_nsproxy_namespaces+0xc0/0x200 [ 1074.387823] ksys_unshare+0x46a/0xa10 [ 1074.387889] ? srso_return_thunk+0x5/0x5f [ 1074.387936] ? __pfx_ksys_unshare+0x10/0x10 [ 1074.388009] ? ksys_write+0x1b1/0x240 [ 1074.388121] __x64_sys_unshare+0x31/0x40 [ 1074.388191] do_syscall_64+0xbf/0x1d0 [ 1074.388248] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1074.388300] RIP: 0033:0x7f119793ab19 [ 1074.388327] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1074.388367] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1074.388410] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1074.388438] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1074.388465] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1074.388492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1074.388518] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1074.388613] 07:25:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:25:23 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1400, 0x0) 07:25:23 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:25:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:25:23 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 31) [ 1074.585824] loop5: detected capacity change from 0 to 40 [ 1074.626534] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:25:23 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 33) 07:25:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0xf5, 0x0, 0x1, 0x4, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@empty}}, &(0x7f0000000140)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x3, r1, 0x1, 0x1, 0x6, @multicast}, 0x14) [ 1074.724549] loop4: detected capacity change from 0 to 40 07:25:23 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1500, 0x0) 07:25:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) mkdirat(r0, &(0x7f0000000380)='./file1\x00', 0xb0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1, {r0}}, './file1\x00'}) openat(r2, &(0x7f0000000340)='\x00', 0x20000, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x13, r1, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r3, 0x0, &(0x7f0000000000), 0x0, 0x4) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r4, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r5, 0x1, 0x49, &(0x7f0000000080)={0x77359400}, 0x10) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) sendfile(r6, r6, 0x0, 0x100000) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x501000, 0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000540)=@IORING_OP_SENDMSG={0x9, 0x1, 0x0, r7, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=@rc={0x1f, @any, 0x1}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)="b58fee44f1f35f37fcab052c0fd90abe12a44330a094250439a02d0d9d35f771573e258baa6d903074007973dd4c613b4761fc81ecfe38a59088083233e92035655d56d4bc55248245ec801aaa45948ad347d27089e1bd339227c67ac0188a91c01cdab2c6719cfbd4c14f59f7df70c04e4ab208c7c118aa1de745fa4975616641eaf0afcd4837dcc25bdf6aecf75e97f9f8431a3780e5f6846e285567256e178eefb98cf34d1400a98a46d9370a086157dadb13d00f4c2bb410d4d0a4bc1abafb6cab752b7946", 0xc7}, {&(0x7f00000000c0)="058697723450ff943bbb147ba2fe39e8ebe4a0fe4ff726b2ce4472a7", 0x1c}], 0x1a1, &(0x7f0000000580)=ANY=[@ANYBLOB="80000000000000003a0000002000000089e2b536cb9b0660089029e28e4ff32b2f9f8075cf1703c512addb61a4ce67e5b1c591d7592da89c53d838916d67d0fef543f6dd1ae52b8f5e62e9e1465ea037118bd98ff089194d0297d2c1d5ef04ce66e611f54c176549bc86d07664ca96c572bbd412a64291a55ac71eb66ea0fd7f00000000000000c80000000000000019010000090000006516ff1c5fd04bf44f3936c8f600bdfbd18e5287ac4a141c3f70baf928309afadd6f7df956ce93e2d78bb3e76063fe1f84ee24b94779061d5c5e7f4216881722221781987b50c36b696078f577e860df47801f36dbd777ce4705ef924455050f63b36bd604c279e922f775496de957b765a7759f85cec845ce210c48e47ec289da89f6223e95750db12487e88ad260ab0292deda87fa3be0ef487d97259153493753836c737de273d5151f589a9b05eabb90c5675a0000001800000000000000ff0000000900000090f3380c000000009800000000000000110000000000000060ff1fd1534c8825dfd80991ba16eec5bc5e638fbb29e8e9ff9886dc96000916f09355153d49e217f2843c6065a8bc8a24aa577224e37d79083e8fa5228dd65918b73a5593249c515641a23274c5e035863132fc4b0130d40d865b7d3bf1a6f760d52b82e5a1b1e37704f93f2e606f3d84e6440b0509cfffdc03da652fce0924d4bb000000000000"], 0x1f8}, 0x0, 0x4000, 0x0, {0x0, r8}}, 0x3ff) [ 1074.812120] syz-executor.4: attempt to access beyond end of device [ 1074.812120] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 07:25:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) [ 1074.882096] lo: left allmulticast mode 07:25:23 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) [ 1075.095859] loop5: detected capacity change from 0 to 40 [ 1075.180925] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:25:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 34) 07:25:41 executing program 4: chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:25:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:25:41 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1600, 0x0) 07:25:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8983, &(0x7f0000000040)={0x6, 'veth1_to_bond\x00', {0x5d8}, 0x5}) 07:25:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:25:41 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 32) 07:25:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) mkdirat(r0, &(0x7f0000000380)='./file1\x00', 0xb0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1, {r0}}, './file1\x00'}) openat(r2, &(0x7f0000000340)='\x00', 0x20000, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x13, r1, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r3, 0x0, &(0x7f0000000000), 0x0, 0x4) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r4, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r5, 0x1, 0x49, &(0x7f0000000080)={0x77359400}, 0x10) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) sendfile(r6, r6, 0x0, 0x100000) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x501000, 0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000540)=@IORING_OP_SENDMSG={0x9, 0x1, 0x0, r7, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=@rc={0x1f, @any, 0x1}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)="b58fee44f1f35f37fcab052c0fd90abe12a44330a094250439a02d0d9d35f771573e258baa6d903074007973dd4c613b4761fc81ecfe38a59088083233e92035655d56d4bc55248245ec801aaa45948ad347d27089e1bd339227c67ac0188a91c01cdab2c6719cfbd4c14f59f7df70c04e4ab208c7c118aa1de745fa4975616641eaf0afcd4837dcc25bdf6aecf75e97f9f8431a3780e5f6846e285567256e178eefb98cf34d1400a98a46d9370a086157dadb13d00f4c2bb410d4d0a4bc1abafb6cab752b7946", 0xc7}, {&(0x7f00000000c0)="058697723450ff943bbb147ba2fe39e8ebe4a0fe4ff726b2ce4472a7", 0x1c}], 0x1a1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1f8}, 0x0, 0x4000, 0x0, {0x0, r8}}, 0x3ff) [ 1092.948728] lo: entered promiscuous mode [ 1092.949184] lo: entered allmulticast mode [ 1092.951176] No source specified [ 1093.021995] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:25:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) [ 1093.059089] FAULT_INJECTION: forcing a failure. [ 1093.059089] name failslab, interval 1, probability 0, space 0, times 0 [ 1093.061527] CPU: 1 UID: 0 PID: 9235 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1093.061623] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1093.061668] Call Trace: [ 1093.061688] [ 1093.061715] dump_stack_lvl+0xfa/0x120 [ 1093.061804] should_fail_ex+0x4d7/0x5e0 [ 1093.061930] should_failslab+0xc2/0x120 [ 1093.062069] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1093.062194] ? __pfx_lock_release+0x10/0x10 [ 1093.062346] ? kstrdup_const+0x57/0x80 [ 1093.062452] kstrdup+0x3e/0xc0 [ 1093.062529] kstrdup_const+0x57/0x80 [ 1093.062608] alloc_vfsmnt+0xe2/0x730 [ 1093.062701] clone_mnt+0x6c/0xd80 [ 1093.062792] ? srso_return_thunk+0x5/0x5f [ 1093.062879] ? srso_return_thunk+0x5/0x5f [ 1093.062977] copy_tree+0x3ba/0x960 [ 1093.063134] copy_mnt_ns+0x1ae/0xab0 [ 1093.063260] ? srso_return_thunk+0x5/0x5f [ 1093.063343] ? srso_return_thunk+0x5/0x5f [ 1093.063460] create_new_namespaces+0xd6/0xaf0 [ 1093.063564] ? srso_return_thunk+0x5/0x5f [ 1093.063645] ? security_capable+0x2f/0x90 [ 1093.063760] unshare_nsproxy_namespaces+0xc0/0x200 [ 1093.063882] ksys_unshare+0x46a/0xa10 [ 1093.064017] ? srso_return_thunk+0x5/0x5f [ 1093.064103] ? __pfx_ksys_unshare+0x10/0x10 [ 1093.064241] ? ksys_write+0x1b1/0x240 [ 1093.064409] __x64_sys_unshare+0x31/0x40 [ 1093.064544] do_syscall_64+0xbf/0x1d0 [ 1093.064643] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1093.064746] RIP: 0033:0x7f4b4b4c4b19 [ 1093.064800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1093.064881] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1093.064956] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1093.065013] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1093.065065] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1093.065118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1093.065170] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1093.065286] [ 1093.110859] No source specified 07:25:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 35) 07:25:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f0000000540)=[{&(0x7f0000000080)=""/176, 0xb0}, {&(0x7f0000000140)=""/87, 0x57}, {&(0x7f0000000200)=""/53, 0x35}, {&(0x7f0000000240)=""/228, 0xe4}, {&(0x7f0000000340)=""/232, 0xe8}, {&(0x7f0000000440)=""/199, 0xc7}], 0x6, 0x9, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x42, &(0x7f0000000040)={0x77359400}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000007c0)={0x0, 0x2710}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'veth1\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000700)={@mcast2, 0x0}, &(0x7f0000000740)=0x14) recvfrom$packet(r1, &(0x7f0000000600)=""/197, 0xc5, 0x40002000, &(0x7f0000000780)={0x11, 0x17, r2, 0x1, 0x9, 0x6, @multicast}, 0x14) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000800), 0x104800, 0x0) ioctl$SG_GET_SG_TABLESIZE(r3, 0x227f, &(0x7f0000000840)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:25:42 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1700, 0x0) [ 1093.301161] FAULT_INJECTION: forcing a failure. [ 1093.301161] name failslab, interval 1, probability 0, space 0, times 0 [ 1093.303408] CPU: 1 UID: 0 PID: 9240 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1093.303504] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1093.303548] Call Trace: [ 1093.303568] [ 1093.303596] dump_stack_lvl+0xfa/0x120 [ 1093.303685] should_fail_ex+0x4d7/0x5e0 [ 1093.303808] ? alloc_vfsmnt+0x23/0x730 [ 1093.303888] should_failslab+0xc2/0x120 [ 1093.304027] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1093.304148] ? srso_return_thunk+0x5/0x5f [ 1093.304229] ? lock_release+0x20f/0x6f0 [ 1093.304366] alloc_vfsmnt+0x23/0x730 [ 1093.304459] clone_mnt+0x6c/0xd80 [ 1093.304550] ? srso_return_thunk+0x5/0x5f [ 1093.304636] ? srso_return_thunk+0x5/0x5f [ 1093.304734] copy_tree+0x3ba/0x960 [ 1093.304891] copy_mnt_ns+0x1ae/0xab0 [ 1093.305017] ? srso_return_thunk+0x5/0x5f [ 1093.305100] ? srso_return_thunk+0x5/0x5f [ 1093.305217] create_new_namespaces+0xd6/0xaf0 [ 1093.305321] ? srso_return_thunk+0x5/0x5f [ 1093.305401] ? security_capable+0x2f/0x90 [ 1093.305517] unshare_nsproxy_namespaces+0xc0/0x200 [ 1093.305638] ksys_unshare+0x46a/0xa10 [ 1093.305768] ? srso_return_thunk+0x5/0x5f [ 1093.305854] ? __pfx_ksys_unshare+0x10/0x10 [ 1093.305992] ? ksys_write+0x1b1/0x240 [ 1093.306159] __x64_sys_unshare+0x31/0x40 [ 1093.306294] do_syscall_64+0xbf/0x1d0 [ 1093.306408] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1093.306510] RIP: 0033:0x7f119793ab19 [ 1093.306565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1093.306645] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1093.306721] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1093.306777] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1093.306830] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1093.306883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1093.306935] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1093.307050] 07:26:00 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 33) 07:26:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:26:00 executing program 4: chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:26:00 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 36) 07:26:00 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:26:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) mkdirat(r0, &(0x7f0000000380)='./file1\x00', 0xb0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1, {r0}}, './file1\x00'}) openat(r2, &(0x7f0000000340)='\x00', 0x20000, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x13, r1, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r3, 0x0, &(0x7f0000000000), 0x0, 0x4) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r4, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r5, 0x1, 0x49, &(0x7f0000000080)={0x77359400}, 0x10) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) sendfile(r6, r6, 0x0, 0x100000) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x501000, 0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000540)=@IORING_OP_SENDMSG={0x9, 0x1, 0x0, r7, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=@rc={0x1f, @any, 0x1}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)="b58fee44f1f35f37fcab052c0fd90abe12a44330a094250439a02d0d9d35f771573e258baa6d903074007973dd4c613b4761fc81ecfe38a59088083233e92035655d56d4bc55248245ec801aaa45948ad347d27089e1bd339227c67ac0188a91c01cdab2c6719cfbd4c14f59f7df70c04e4ab208c7c118aa1de745fa4975616641eaf0afcd4837dcc25bdf6aecf75e97f9f8431a3780e5f6846e285567256e178eefb98cf34d1400a98a46d9370a086157dadb13d00f4c2bb410d4d0a4bc1abafb6cab752b7946", 0xc7}, {&(0x7f00000000c0)="058697723450ff943bbb147ba2fe39e8ebe4a0fe4ff726b2ce4472a7", 0x1c}], 0x1a1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1f8}, 0x0, 0x4000, 0x0, {0x0, r8}}, 0x3ff) 07:26:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) sendmsg$AUDIT_SET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x3e9, 0x400, 0x70bd25, 0x25dfdbff, {0x8, 0x0, 0x1, 0x0, 0x6, 0xffff7fff, 0x4, 0x800, 0x0, 0x57}, ["", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:26:00 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1800, 0x0) 07:26:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 1111.859108] No source specified 07:26:00 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 34) 07:26:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x10b000, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r2, 0x0) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, r2, 0xee01}, 0xc) [ 1111.964168] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:26:00 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 37) 07:26:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:26:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) mkdirat(r0, &(0x7f0000000380)='./file1\x00', 0xb0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1, {r0}}, './file1\x00'}) openat(r2, &(0x7f0000000340)='\x00', 0x20000, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x13, r1, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r3, 0x0, &(0x7f0000000000), 0x0, 0x4) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r4, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r5, 0x1, 0x49, &(0x7f0000000080)={0x77359400}, 0x10) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) sendfile(r6, r6, 0x0, 0x100000) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x501000, 0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000540)=@IORING_OP_SENDMSG={0x9, 0x1, 0x0, r7, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=@rc={0x1f, @any, 0x1}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)="b58fee44f1f35f37fcab052c0fd90abe12a44330a094250439a02d0d9d35f771573e258baa6d903074007973dd4c613b4761fc81ecfe38a59088083233e92035655d56d4bc55248245ec801aaa45948ad347d27089e1bd339227c67ac0188a91c01cdab2c6719cfbd4c14f59f7df70c04e4ab208c7c118aa1de745fa4975616641eaf0afcd4837dcc25bdf6aecf75e97f9f8431a3780e5f6846e285567256e178eefb98cf34d1400a98a46d9370a086157dadb13d00f4c2bb410d4d0a4bc1abafb6cab752b7946", 0xc7}, {&(0x7f00000000c0)="058697723450ff943bbb147ba2fe39e8ebe4a0fe4ff726b2ce4472a7", 0x1c}], 0x1a1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1f8}, 0x0, 0x4000, 0x0, {0x0, r8}}, 0x3ff) 07:26:01 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1900, 0x0) 07:26:01 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 35) [ 1112.398708] FAULT_INJECTION: forcing a failure. [ 1112.398708] name failslab, interval 1, probability 0, space 0, times 0 [ 1112.400888] CPU: 1 UID: 0 PID: 9288 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1112.400984] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1112.401029] Call Trace: [ 1112.401048] [ 1112.401075] dump_stack_lvl+0xfa/0x120 [ 1112.401165] should_fail_ex+0x4d7/0x5e0 [ 1112.401298] should_failslab+0xc2/0x120 [ 1112.401438] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1112.401563] ? __pfx_lock_release+0x10/0x10 [ 1112.401680] ? kstrdup_const+0x57/0x80 [ 1112.401779] kstrdup+0x3e/0xc0 [ 1112.401856] kstrdup_const+0x57/0x80 [ 1112.401936] alloc_vfsmnt+0xe2/0x730 [ 1112.402029] clone_mnt+0x6c/0xd80 [ 1112.402120] ? srso_return_thunk+0x5/0x5f [ 1112.402207] ? srso_return_thunk+0x5/0x5f [ 1112.402304] copy_tree+0x3ba/0x960 [ 1112.402462] copy_mnt_ns+0x1ae/0xab0 [ 1112.402587] ? srso_return_thunk+0x5/0x5f [ 1112.402671] ? srso_return_thunk+0x5/0x5f [ 1112.402788] create_new_namespaces+0xd6/0xaf0 [ 1112.402892] ? srso_return_thunk+0x5/0x5f [ 1112.402985] ? security_capable+0x2f/0x90 [ 1112.403101] unshare_nsproxy_namespaces+0xc0/0x200 [ 1112.403222] ksys_unshare+0x46a/0xa10 [ 1112.403352] ? srso_return_thunk+0x5/0x5f [ 1112.403438] ? __pfx_ksys_unshare+0x10/0x10 [ 1112.403576] ? ksys_write+0x1b1/0x240 [ 1112.403743] __x64_sys_unshare+0x31/0x40 [ 1112.403878] do_syscall_64+0xbf/0x1d0 [ 1112.403977] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1112.404080] RIP: 0033:0x7f119793ab19 07:26:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000011c0)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000001280), &(0x7f0000001300)=0x68) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) recvfrom(r0, &(0x7f0000000040)=""/4096, 0x1000, 0x100, &(0x7f0000001040)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) creat(&(0x7f0000001240)='./file0\x00', 0x55) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000001200)={'veth1_to_team\x00'}) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r5, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001140)={'sit0\x00', &(0x7f00000010c0)={'ip6_vti0\x00', 0x0, 0x29, 0x20, 0x40, 0x8, 0xc, @loopback, @local, 0x80, 0x1, 0x5, 0x3}}) setsockopt$inet_mreqn(r5, 0x0, 0x20, &(0x7f0000001180)={@empty, @private=0xa010101, r6}, 0xc) [ 1112.404135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1112.404215] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1112.404291] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1112.404347] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1112.404400] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1112.404453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1112.404504] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1112.404621] [ 1112.426722] syz-executor.5: attempt to access beyond end of device [ 1112.426722] loop5: rw=0, sector=0, nr_sectors = 1 limit=0 [ 1112.461775] FAT-fs (loop5): unable to read boot sector 07:26:01 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1a00, 0x0) [ 1112.681024] FAULT_INJECTION: forcing a failure. [ 1112.681024] name failslab, interval 1, probability 0, space 0, times 0 [ 1112.681669] syz-executor.4 (9266) used greatest stack depth: 23464 bytes left [ 1112.683018] CPU: 1 UID: 0 PID: 9299 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1112.683115] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1112.683160] Call Trace: [ 1112.683180] [ 1112.683207] dump_stack_lvl+0xfa/0x120 [ 1112.683302] should_fail_ex+0x4d7/0x5e0 [ 1112.683424] ? alloc_vfsmnt+0x23/0x730 [ 1112.683503] should_failslab+0xc2/0x120 [ 1112.683642] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1112.683763] ? srso_return_thunk+0x5/0x5f [ 1112.683843] ? lock_release+0x20f/0x6f0 [ 1112.683971] alloc_vfsmnt+0x23/0x730 [ 1112.684063] clone_mnt+0x6c/0xd80 [ 1112.684154] ? srso_return_thunk+0x5/0x5f [ 1112.684240] ? srso_return_thunk+0x5/0x5f [ 1112.684336] copy_tree+0x3ba/0x960 [ 1112.684490] copy_mnt_ns+0x1ae/0xab0 [ 1112.684615] ? srso_return_thunk+0x5/0x5f [ 1112.684698] ? srso_return_thunk+0x5/0x5f [ 1112.684812] create_new_namespaces+0xd6/0xaf0 [ 1112.684916] ? srso_return_thunk+0x5/0x5f [ 1112.684997] ? security_capable+0x2f/0x90 [ 1112.685110] unshare_nsproxy_namespaces+0xc0/0x200 [ 1112.685233] ksys_unshare+0x46a/0xa10 [ 1112.685363] ? srso_return_thunk+0x5/0x5f [ 1112.685449] ? __pfx_ksys_unshare+0x10/0x10 [ 1112.685586] ? ksys_write+0x1b1/0x240 [ 1112.685749] __x64_sys_unshare+0x31/0x40 [ 1112.685885] do_syscall_64+0xbf/0x1d0 [ 1112.685983] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1112.686086] RIP: 0033:0x7f4b4b4c4b19 [ 1112.686141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1112.686221] RSP: 002b:00007f4b48a19188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1112.686297] RAX: ffffffffffffffda RBX: 00007f4b4b5d8020 RCX: 00007f4b4b4c4b19 [ 1112.686353] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1112.686406] RBP: 00007f4b48a191d0 R08: 0000000000000000 R09: 0000000000000000 [ 1112.686459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1112.686512] R13: 00007fffae08b18f R14: 00007f4b48a19300 R15: 0000000000022000 [ 1112.686623] 07:26:22 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1b00, 0x0) 07:26:22 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 38) 07:26:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:26:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) dup2(0xffffffffffffffff, r1) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00', 0x0}) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000080)={@multicast1, @multicast1, r3}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:26:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:26:22 executing program 4: chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:26:22 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 36) 07:26:22 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:26:22 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1c00, 0x0) [ 1133.856613] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1133.880512] syz-executor.5: attempt to access beyond end of device [ 1133.880512] loop5: rw=0, sector=0, nr_sectors = 1 limit=0 [ 1133.886583] FAT-fs (loop5): unable to read boot sector 07:26:22 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 39) 07:26:22 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1d00, 0x0) 07:26:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x4, 0x4) inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x2000080) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:26:23 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 37) 07:26:23 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 40) [ 1134.388914] FAULT_INJECTION: forcing a failure. [ 1134.388914] name failslab, interval 1, probability 0, space 0, times 0 [ 1134.390962] CPU: 0 UID: 0 PID: 9352 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1134.391057] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1134.391102] Call Trace: [ 1134.391122] [ 1134.391152] dump_stack_lvl+0xfa/0x120 [ 1134.391251] should_fail_ex+0x4d7/0x5e0 [ 1134.391409] should_failslab+0xc2/0x120 [ 1134.391557] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1134.391681] ? __pfx_lock_release+0x10/0x10 [ 1134.391840] ? kstrdup_const+0x57/0x80 [ 1134.391976] kstrdup+0x3e/0xc0 [ 1134.392064] kstrdup_const+0x57/0x80 [ 1134.392150] alloc_vfsmnt+0xe2/0x730 [ 1134.392261] clone_mnt+0x6c/0xd80 [ 1134.392353] ? srso_return_thunk+0x5/0x5f [ 1134.392447] ? srso_return_thunk+0x5/0x5f [ 1134.392566] copy_tree+0x3ba/0x960 [ 1134.392777] copy_mnt_ns+0x1ae/0xab0 [ 1134.392903] ? srso_return_thunk+0x5/0x5f [ 1134.392990] ? srso_return_thunk+0x5/0x5f [ 1134.393154] create_new_namespaces+0xd6/0xaf0 [ 1134.393262] ? srso_return_thunk+0x5/0x5f [ 1134.393342] ? security_capable+0x2f/0x90 [ 1134.393490] unshare_nsproxy_namespaces+0xc0/0x200 [ 1134.393630] ksys_unshare+0x46a/0xa10 [ 1134.393761] ? srso_return_thunk+0x5/0x5f [ 1134.393854] ? __pfx_ksys_unshare+0x10/0x10 [ 1134.394000] ? ksys_write+0x1b1/0x240 [ 1134.394224] __x64_sys_unshare+0x31/0x40 [ 1134.394364] do_syscall_64+0xbf/0x1d0 [ 1134.394477] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1134.394580] RIP: 0033:0x7f4b4b4c4b19 [ 1134.394637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1134.394718] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1134.394794] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1134.394850] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1134.394903] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1134.394956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1134.395008] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1134.395198] 07:26:23 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:26:23 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 41) 07:26:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:26:23 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:26:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 1134.648772] syz-executor.5: attempt to access beyond end of device [ 1134.648772] loop5: rw=0, sector=0, nr_sectors = 1 limit=0 [ 1134.650926] FAT-fs (loop5): unable to read boot sector 07:26:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:26:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) io_setup(0x209e, &(0x7f0000000040)=0x0) r2 = eventfd2(0x10000, 0x80003) r3 = syz_open_dev$vcsu(&(0x7f0000000200), 0x20, 0x8000) r4 = socket$inet6(0xa, 0x80000, 0x1) io_submit(r1, 0x3, &(0x7f00000003c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x9, 0x1f, r0, &(0x7f0000000080)="fa1ecfdbd759184f7a9d", 0xa, 0x9, 0x0, 0x4, r2}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x2, r0, &(0x7f0000000100)="6338efa19f70c921deb85d909f91a3162546e948e9023e35cfe68afcf017037e247560d267948090253aa055ab1b1c1df1c75b888c8d73de26d3126b32960b21dfbc712922bcd3f31f15536d327a62a11ee966bbbdebf526a57f4da0013c2e0553ab507fad8b010e754ec9bf50a9c283e8945f9f25eb89edba6466ece0560134e77b76006be51de959eb23a0fa6b2841c37d33acb25b48ebacb3f604a6533af8396ca375969de5e9ca6d5fbbe1743880625fc0641628fd52cacb2edbec9c97814939941ea448727a3706", 0xca, 0x1, 0x0, 0x2, r3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x3, r4, &(0x7f0000000280)="1f302bc0229b497963dcd04b35b9c79619aa03a3c50c44c25a04ef5f132a2f50d34ae51a2813d211655ad1b75ceceb869ba8d8865ecba522857c3b6c7e1ad51b5ddf042534a70c635b92314b1716cef2b4b9774862a6a0cf586c3a1f36c711a67f922f89b5c71997815debd609ab247e522a20937196ebe773bf8b119bc393db6e7a17787f8a97f21f4b344850173c4f1dede56155075ec6dd18b67abb3f70b88e90631803e63c34156aa5aa08416ddbf771323f0297fa47133fd62d652b582214c89ef4aacbe2dd99ae79efe9d736584273a776902cbff8e6bcb673ac642d3cc5f740430c92a539e58c36af335dd009bdb3a349fc25345a", 0xf8, 0x5, 0x0, 0x2}]) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 1134.876036] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1134.882949] syz-executor.5: attempt to access beyond end of device [ 1134.882949] loop5: rw=0, sector=0, nr_sectors = 1 limit=0 [ 1134.897387] FAT-fs (loop5): unable to read boot sector 07:26:45 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 42) 07:26:45 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1e00, 0x0) 07:26:45 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 38) 07:26:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:26:45 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:26:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000011c0)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000001280), &(0x7f0000001300)=0x68) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) recvfrom(r0, &(0x7f0000000040)=""/4096, 0x1000, 0x100, &(0x7f0000001040)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) creat(&(0x7f0000001240)='./file0\x00', 0x55) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000001200)={'veth1_to_team\x00'}) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r5, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001140)={'sit0\x00', &(0x7f00000010c0)={'ip6_vti0\x00', 0x0, 0x29, 0x20, 0x40, 0x8, 0xc, @loopback, @local, 0x80, 0x1, 0x5, 0x3}}) setsockopt$inet_mreqn(r5, 0x0, 0x20, &(0x7f0000001180)={@empty, @private=0xa010101, r6}, 0xc) 07:26:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:26:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0xf7, 0x0, 0x1, 0x7, 0x6, @random=' \x00'}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 1156.723675] loop4: detected capacity change from 0 to 40 [ 1156.733552] syz-executor.5: attempt to access beyond end of device [ 1156.733552] loop5: rw=0, sector=0, nr_sectors = 1 limit=0 [ 1156.740993] lo: left promiscuous mode [ 1156.741829] lo: left allmulticast mode [ 1156.745447] FAT-fs (loop5): unable to read boot sector [ 1156.753891] FAULT_INJECTION: forcing a failure. [ 1156.753891] name failslab, interval 1, probability 0, space 0, times 0 [ 1156.755792] CPU: 0 UID: 0 PID: 9389 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1156.755888] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1156.755932] Call Trace: [ 1156.755952] [ 1156.755983] dump_stack_lvl+0xfa/0x120 [ 1156.756082] should_fail_ex+0x4d7/0x5e0 [ 1156.756226] ? alloc_vfsmnt+0x23/0x730 [ 1156.756313] should_failslab+0xc2/0x120 [ 1156.756459] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1156.756595] ? srso_return_thunk+0x5/0x5f [ 1156.756676] ? lock_release+0x20f/0x6f0 [ 1156.756837] alloc_vfsmnt+0x23/0x730 [ 1156.756947] clone_mnt+0x6c/0xd80 [ 1156.757039] ? srso_return_thunk+0x5/0x5f [ 1156.757132] ? srso_return_thunk+0x5/0x5f [ 1156.757251] copy_tree+0x3ba/0x960 [ 1156.757461] copy_mnt_ns+0x1ae/0xab0 [ 1156.757587] ? srso_return_thunk+0x5/0x5f [ 1156.757674] ? srso_return_thunk+0x5/0x5f [ 1156.757837] create_new_namespaces+0xd6/0xaf0 [ 1156.757945] ? srso_return_thunk+0x5/0x5f [ 1156.758025] ? security_capable+0x2f/0x90 [ 1156.758172] unshare_nsproxy_namespaces+0xc0/0x200 [ 1156.758311] ksys_unshare+0x46a/0xa10 [ 1156.758441] ? srso_return_thunk+0x5/0x5f [ 1156.758534] ? __pfx_ksys_unshare+0x10/0x10 [ 1156.758680] ? ksys_write+0x1b1/0x240 [ 1156.758903] __x64_sys_unshare+0x31/0x40 [ 1156.759042] do_syscall_64+0xbf/0x1d0 [ 1156.759155] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1156.759257] RIP: 0033:0x7f4b4b4c4b19 [ 1156.759312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1156.759393] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1156.759468] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1156.759525] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1156.759589] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1156.759642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1156.759694] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1156.759883] [ 1156.817250] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:26:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x9}}, './file0\x00'}) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 1156.949029] lo: entered promiscuous mode [ 1156.950088] lo: entered allmulticast mode 07:26:45 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1f00, 0x0) 07:26:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:26:45 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 43) 07:26:45 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 39) 07:26:45 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:26:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r2, 0x5441, 0x7fff) accept$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f0000000140)=0x10) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r4, 0x1, 0x22, &(0x7f0000000180)=""/216, &(0x7f0000000280)=0xd8) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r5, 0x40045431, &(0x7f0000000040)) ioctl$TIOCEXCL(r5, 0x540c) ioctl$TIOCGPTPEER(r5, 0x5441, 0x7fff) ioctl$AUTOFS_IOC_ASKUMOUNT(r5, 0x80049370, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'geneve0\x00'}) [ 1157.405230] syz-executor.5: attempt to access beyond end of device [ 1157.405230] loop5: rw=0, sector=0, nr_sectors = 1 limit=0 [ 1157.418523] FAT-fs (loop5): unable to read boot sector 07:26:46 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x2000, 0x0) [ 1157.490976] loop4: detected capacity change from 0 to 40 07:26:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:26:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 44) [ 1157.894054] loop5: detected capacity change from 0 to 40 [ 1157.919053] FAT-fs (loop5): bogus number of reserved sectors [ 1157.920158] FAT-fs (loop5): Can't find a valid FAT filesystem 07:27:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000011c0)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000001280), &(0x7f0000001300)=0x68) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) recvfrom(r0, &(0x7f0000000040)=""/4096, 0x1000, 0x100, &(0x7f0000001040)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) creat(&(0x7f0000001240)='./file0\x00', 0x55) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000001200)={'veth1_to_team\x00'}) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r5, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001140)={'sit0\x00', &(0x7f00000010c0)={'ip6_vti0\x00', 0x0, 0x29, 0x20, 0x40, 0x8, 0xc, @loopback, @local, 0x80, 0x1, 0x5, 0x3}}) setsockopt$inet_mreqn(r5, 0x0, 0x20, &(0x7f0000001180)={@empty, @private=0xa010101, r6}, 0xc) 07:27:05 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:27:05 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:27:05 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 45) 07:27:05 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x2100, 0x0) 07:27:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:27:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fff) dup2(r0, r1) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x24000, 0x16) bind$packet(r3, &(0x7f00000000c0)={0x11, 0xdd, 0x0, 0x1, 0xff, 0x6, @multicast}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'batadv_slave_0\x00'}) 07:27:05 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 40) [ 1176.790212] FAULT_INJECTION: forcing a failure. [ 1176.790212] name failslab, interval 1, probability 0, space 0, times 0 [ 1176.791315] CPU: 1 UID: 0 PID: 9439 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1176.791363] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1176.791386] Call Trace: [ 1176.791397] [ 1176.791411] dump_stack_lvl+0xfa/0x120 [ 1176.791458] should_fail_ex+0x4d7/0x5e0 [ 1176.791521] ? alloc_vfsmnt+0x23/0x730 [ 1176.791562] should_failslab+0xc2/0x120 [ 1176.791632] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1176.791694] ? srso_return_thunk+0x5/0x5f [ 1176.791735] ? lock_release+0x20f/0x6f0 [ 1176.791801] alloc_vfsmnt+0x23/0x730 [ 1176.791848] clone_mnt+0x6c/0xd80 [ 1176.791893] ? srso_return_thunk+0x5/0x5f [ 1176.791936] ? srso_return_thunk+0x5/0x5f [ 1176.791985] copy_tree+0x3ba/0x960 [ 1176.792064] copy_mnt_ns+0x1ae/0xab0 [ 1176.792127] ? srso_return_thunk+0x5/0x5f [ 1176.792168] ? srso_return_thunk+0x5/0x5f [ 1176.792227] create_new_namespaces+0xd6/0xaf0 [ 1176.792284] ? srso_return_thunk+0x5/0x5f [ 1176.792324] ? security_capable+0x2f/0x90 [ 1176.792383] unshare_nsproxy_namespaces+0xc0/0x200 [ 1176.792444] ksys_unshare+0x46a/0xa10 [ 1176.792510] ? srso_return_thunk+0x5/0x5f [ 1176.792553] ? __pfx_ksys_unshare+0x10/0x10 [ 1176.792622] ? ksys_write+0x1b1/0x240 [ 1176.792705] __x64_sys_unshare+0x31/0x40 [ 1176.792773] do_syscall_64+0xbf/0x1d0 [ 1176.792823] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1176.792875] RIP: 0033:0x7f4b4b4c4b19 [ 1176.792903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1176.792943] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1176.792981] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1176.793010] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1176.793036] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1176.793062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1176.793088] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1176.793146] [ 1176.818101] loop5: detected capacity change from 0 to 40 [ 1176.821572] FAT-fs (loop5): bogus number of reserved sectors [ 1176.822096] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1176.893077] loop4: detected capacity change from 0 to 40 07:27:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) [ 1176.930690] FAULT_INJECTION: forcing a failure. [ 1176.930690] name failslab, interval 1, probability 0, space 0, times 0 [ 1176.932788] CPU: 0 UID: 0 PID: 9444 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1176.932887] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1176.932940] Call Trace: [ 1176.932961] [ 1176.932993] dump_stack_lvl+0xfa/0x120 [ 1176.933093] should_fail_ex+0x4d7/0x5e0 [ 1176.933252] ? alloc_vfsmnt+0x23/0x730 [ 1176.933339] should_failslab+0xc2/0x120 07:27:05 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 41) [ 1176.933486] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1176.933610] ? srso_return_thunk+0x5/0x5f [ 1176.933691] ? lock_release+0x20f/0x6f0 [ 1176.933852] alloc_vfsmnt+0x23/0x730 [ 1176.933977] clone_mnt+0x6c/0xd80 [ 1176.934069] ? srso_return_thunk+0x5/0x5f [ 1176.934163] ? srso_return_thunk+0x5/0x5f [ 1176.934282] copy_tree+0x3ba/0x960 [ 1176.934493] copy_mnt_ns+0x1ae/0xab0 [ 1176.934618] ? srso_return_thunk+0x5/0x5f [ 1176.934705] ? srso_return_thunk+0x5/0x5f [ 1176.934868] create_new_namespaces+0xd6/0xaf0 [ 1176.934998] ? srso_return_thunk+0x5/0x5f [ 1176.935078] ? security_capable+0x2f/0x90 [ 1176.935226] unshare_nsproxy_namespaces+0xc0/0x200 [ 1176.935365] ksys_unshare+0x46a/0xa10 [ 1176.935495] ? srso_return_thunk+0x5/0x5f [ 1176.935588] ? __pfx_ksys_unshare+0x10/0x10 [ 1176.935733] ? ksys_write+0x1b1/0x240 [ 1176.935875] ? srso_return_thunk+0x5/0x5f [ 1176.936044] __x64_sys_unshare+0x31/0x40 [ 1176.936183] do_syscall_64+0xbf/0x1d0 [ 1176.936297] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1176.936399] RIP: 0033:0x7f119793ab19 [ 1176.936454] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1176.936535] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1176.936610] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1176.936667] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1176.936720] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1176.936773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1176.936825] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1176.937029] [ 1176.995665] loop5: detected capacity change from 0 to 40 [ 1177.015184] FAT-fs (loop5): bogus number of reserved sectors [ 1177.015873] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1177.029065] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:27:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:27:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000011c0)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000001280), &(0x7f0000001300)=0x68) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) recvfrom(r0, &(0x7f0000000040)=""/4096, 0x1000, 0x100, &(0x7f0000001040)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) creat(&(0x7f0000001240)='./file0\x00', 0x55) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000001200)={'veth1_to_team\x00'}) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r5, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001140)={'sit0\x00', &(0x7f00000010c0)={'ip6_vti0\x00', 0x0, 0x29, 0x20, 0x40, 0x8, 0xc, @loopback, @local, 0x80, 0x1, 0x5, 0x3}}) setsockopt$inet_mreqn(r5, 0x0, 0x20, &(0x7f0000001180)={@empty, @private=0xa010101, r6}, 0xc) 07:27:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000200)={@broadcast, @multicast1}, 0xc) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xac, r3, 0x8, 0x70bd2d, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}}]}, @MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_ADDR={0x44, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private1}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x72}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x40}, 0x0) 07:27:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 46) 07:27:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:27:24 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x2200, 0x0) 07:27:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 42) 07:27:24 executing program 2: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) [ 1195.489291] loop5: detected capacity change from 0 to 40 [ 1195.499050] FAULT_INJECTION: forcing a failure. [ 1195.499050] name failslab, interval 1, probability 0, space 0, times 0 [ 1195.500064] CPU: 1 UID: 0 PID: 9476 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1195.500112] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1195.500135] Call Trace: [ 1195.500145] [ 1195.500159] dump_stack_lvl+0xfa/0x120 [ 1195.500206] should_fail_ex+0x4d7/0x5e0 [ 1195.500275] should_failslab+0xc2/0x120 [ 1195.500346] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1195.500409] ? __pfx_lock_release+0x10/0x10 [ 1195.500468] ? kstrdup_const+0x57/0x80 [ 1195.500519] kstrdup+0x3e/0xc0 [ 1195.500558] kstrdup_const+0x57/0x80 [ 1195.500597] alloc_vfsmnt+0xe2/0x730 [ 1195.500645] clone_mnt+0x6c/0xd80 [ 1195.500691] ? srso_return_thunk+0x5/0x5f [ 1195.500735] ? srso_return_thunk+0x5/0x5f [ 1195.500784] copy_tree+0x3ba/0x960 [ 1195.500863] copy_mnt_ns+0x1ae/0xab0 [ 1195.500925] ? srso_return_thunk+0x5/0x5f [ 1195.500967] ? srso_return_thunk+0x5/0x5f [ 1195.501026] create_new_namespaces+0xd6/0xaf0 [ 1195.501079] ? srso_return_thunk+0x5/0x5f [ 1195.501119] ? security_capable+0x2f/0x90 [ 1195.501177] unshare_nsproxy_namespaces+0xc0/0x200 [ 1195.501238] ksys_unshare+0x46a/0xa10 [ 1195.501304] ? srso_return_thunk+0x5/0x5f [ 1195.501347] ? __pfx_ksys_unshare+0x10/0x10 [ 1195.501416] ? ksys_write+0x1b1/0x240 [ 1195.501500] __x64_sys_unshare+0x31/0x40 [ 1195.501568] do_syscall_64+0xbf/0x1d0 [ 1195.501618] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1195.501670] RIP: 0033:0x7f4b4b4c4b19 [ 1195.501698] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1195.501738] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1195.501776] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1195.501804] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1195.501831] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1195.501857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1195.501896] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1195.501962] [ 1195.518640] FAT-fs (loop5): bogus number of reserved sectors [ 1195.519141] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1195.573046] loop4: detected capacity change from 0 to 40 07:27:24 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x2300, 0x0) 07:27:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) [ 1195.743751] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:27:24 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x2400, 0x0) [ 1195.941073] loop5: detected capacity change from 0 to 40 07:27:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 43) [ 1195.959347] FAT-fs (loop5): bogus number of reserved sectors [ 1195.960428] FAT-fs (loop5): Can't find a valid FAT filesystem 07:27:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 47) [ 1196.188352] FAULT_INJECTION: forcing a failure. [ 1196.188352] name failslab, interval 1, probability 0, space 0, times 0 [ 1196.189507] CPU: 1 UID: 0 PID: 9509 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1196.189555] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1196.189578] Call Trace: [ 1196.189588] [ 1196.189602] dump_stack_lvl+0xfa/0x120 [ 1196.189650] should_fail_ex+0x4d7/0x5e0 [ 1196.189715] should_failslab+0xc2/0x120 [ 1196.189786] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1196.189849] ? __pfx_lock_release+0x10/0x10 [ 1196.189923] ? kstrdup_const+0x57/0x80 [ 1196.189981] kstrdup+0x3e/0xc0 [ 1196.190020] kstrdup_const+0x57/0x80 [ 1196.190059] alloc_vfsmnt+0xe2/0x730 [ 1196.190107] clone_mnt+0x6c/0xd80 [ 1196.190154] ? srso_return_thunk+0x5/0x5f [ 1196.190199] ? srso_return_thunk+0x5/0x5f [ 1196.190252] copy_tree+0x3ba/0x960 [ 1196.190331] copy_mnt_ns+0x1ae/0xab0 [ 1196.190394] ? srso_return_thunk+0x5/0x5f [ 1196.190436] ? srso_return_thunk+0x5/0x5f [ 1196.190495] create_new_namespaces+0xd6/0xaf0 [ 1196.190553] ? srso_return_thunk+0x5/0x5f [ 1196.190593] ? security_capable+0x2f/0x90 [ 1196.190652] unshare_nsproxy_namespaces+0xc0/0x200 [ 1196.190712] ksys_unshare+0x46a/0xa10 [ 1196.190778] ? srso_return_thunk+0x5/0x5f [ 1196.190821] ? __pfx_ksys_unshare+0x10/0x10 [ 1196.190890] ? ksys_write+0x1b1/0x240 [ 1196.190974] __x64_sys_unshare+0x31/0x40 [ 1196.191042] do_syscall_64+0xbf/0x1d0 [ 1196.191092] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1196.191144] RIP: 0033:0x7f119793ab19 [ 1196.191171] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1196.191212] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1196.191250] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1196.191278] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1196.191305] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1196.191332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1196.191358] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1196.191416] 07:27:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:27:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:27:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000011c0)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000001280), &(0x7f0000001300)=0x68) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) recvfrom(r0, &(0x7f0000000040)=""/4096, 0x1000, 0x100, &(0x7f0000001040)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) creat(&(0x7f0000001240)='./file0\x00', 0x55) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000001200)={'veth1_to_team\x00'}) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r5, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001140)={'sit0\x00', &(0x7f00000010c0)={'ip6_vti0\x00', 0x0, 0x29, 0x20, 0x40, 0x8, 0xc, @loopback, @local, 0x80, 0x1, 0x5, 0x3}}) 07:27:46 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x2702, 0x0) 07:27:46 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 44) 07:27:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:27:46 executing program 2: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:27:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 48) 07:27:46 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 45) [ 1217.837834] loop4: detected capacity change from 0 to 40 [ 1217.900343] loop5: detected capacity change from 0 to 40 07:27:46 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x3801, 0x0) [ 1217.937928] FAULT_INJECTION: forcing a failure. [ 1217.937928] name failslab, interval 1, probability 0, space 0, times 0 [ 1217.940137] CPU: 1 UID: 0 PID: 9531 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1217.940233] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1217.940286] Call Trace: [ 1217.940310] [ 1217.940339] dump_stack_lvl+0xfa/0x120 [ 1217.940428] should_fail_ex+0x4d7/0x5e0 [ 1217.940550] ? alloc_vfsmnt+0x23/0x730 [ 1217.940629] should_failslab+0xc2/0x120 [ 1217.940768] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1217.940889] ? srso_return_thunk+0x5/0x5f [ 1217.940969] ? lock_release+0x20f/0x6f0 [ 1217.941098] alloc_vfsmnt+0x23/0x730 [ 1217.941191] clone_mnt+0x6c/0xd80 [ 1217.941282] ? srso_return_thunk+0x5/0x5f [ 1217.941368] ? srso_return_thunk+0x5/0x5f [ 1217.941466] copy_tree+0x3ba/0x960 [ 1217.941624] copy_mnt_ns+0x1ae/0xab0 [ 1217.941749] ? srso_return_thunk+0x5/0x5f [ 1217.941832] ? srso_return_thunk+0x5/0x5f [ 1217.941949] create_new_namespaces+0xd6/0xaf0 [ 1217.942059] ? srso_return_thunk+0x5/0x5f [ 1217.942140] ? security_capable+0x2f/0x90 [ 1217.942255] unshare_nsproxy_namespaces+0xc0/0x200 [ 1217.942377] ksys_unshare+0x46a/0xa10 [ 1217.942507] ? srso_return_thunk+0x5/0x5f [ 1217.942592] ? __pfx_ksys_unshare+0x10/0x10 [ 1217.942746] ? ksys_write+0x1b1/0x240 [ 1217.942912] __x64_sys_unshare+0x31/0x40 [ 1217.943053] do_syscall_64+0xbf/0x1d0 [ 1217.943155] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1217.943258] RIP: 0033:0x7f4b4b4c4b19 [ 1217.943312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1217.943392] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1217.943468] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1217.943525] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1217.943577] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1217.943630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1217.943682] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1217.943798] [ 1217.985151] FAT-fs (loop5): bogus number of reserved sectors [ 1217.986369] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1218.011360] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:27:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:27:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'veth0_to_bond\x00'}) 07:27:47 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 46) 07:27:47 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x3901, 0x0) 07:27:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 49) [ 1218.467975] loop5: detected capacity change from 0 to 40 [ 1218.552001] FAT-fs (loop5): bogus number of reserved sectors [ 1218.553159] FAT-fs (loop5): Can't find a valid FAT filesystem 07:27:47 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:27:47 executing program 2: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) [ 1218.957610] loop4: detected capacity change from 0 to 40 [ 1219.108745] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:28:04 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 47) 07:28:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:28:04 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:28:04 executing program 1: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x84, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x9, 0x5a}}}}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6435697ad4b362d784127ef725"}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_KEY_IDX={0x5}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY={0x30, 0x50, 0x0, 0x1, [@NL80211_KEY_SEQ={0x4}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x4}, @NL80211_KEY_SEQ={0x11, 0x4, "fe20485b3a9f49bfe917e692f2"}, @NL80211_KEY_DEFAULT_TYPES={0x8, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:28:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000011c0)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000001280), &(0x7f0000001300)=0x68) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) recvfrom(r0, &(0x7f0000000040)=""/4096, 0x1000, 0x100, &(0x7f0000001040)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) creat(&(0x7f0000001240)='./file0\x00', 0x55) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000001200)={'veth1_to_team\x00'}) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r5, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) 07:28:04 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 50) 07:28:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:28:04 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x3f00, 0x0) [ 1235.779230] FAULT_INJECTION: forcing a failure. [ 1235.779230] name failslab, interval 1, probability 0, space 0, times 0 [ 1235.780460] CPU: 1 UID: 0 PID: 9570 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1235.780516] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1235.780542] Call Trace: [ 1235.780554] [ 1235.780570] dump_stack_lvl+0xfa/0x120 [ 1235.780624] should_fail_ex+0x4d7/0x5e0 [ 1235.780699] should_failslab+0xc2/0x120 [ 1235.780781] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1235.780854] ? __pfx_lock_release+0x10/0x10 [ 1235.780923] ? kstrdup_const+0x57/0x80 [ 1235.780982] kstrdup+0x3e/0xc0 [ 1235.781026] kstrdup_const+0x57/0x80 [ 1235.781072] alloc_vfsmnt+0xe2/0x730 [ 1235.781127] clone_mnt+0x6c/0xd80 [ 1235.781180] ? srso_return_thunk+0x5/0x5f [ 1235.781231] ? srso_return_thunk+0x5/0x5f [ 1235.781292] copy_tree+0x3ba/0x960 [ 1235.781384] copy_mnt_ns+0x1ae/0xab0 [ 1235.781456] ? srso_return_thunk+0x5/0x5f [ 1235.781504] ? srso_return_thunk+0x5/0x5f [ 1235.781572] create_new_namespaces+0xd6/0xaf0 [ 1235.781634] ? srso_return_thunk+0x5/0x5f [ 1235.781680] ? security_capable+0x2f/0x90 [ 1235.781748] unshare_nsproxy_namespaces+0xc0/0x200 [ 1235.781818] ksys_unshare+0x46a/0xa10 [ 1235.781894] ? srso_return_thunk+0x5/0x5f [ 1235.781944] ? __pfx_ksys_unshare+0x10/0x10 [ 1235.782024] ? ksys_write+0x1b1/0x240 [ 1235.782120] __x64_sys_unshare+0x31/0x40 [ 1235.782199] do_syscall_64+0xbf/0x1d0 [ 1235.782256] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1235.782317] RIP: 0033:0x7f4b4b4c4b19 [ 1235.782348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1235.782395] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1235.782439] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1235.782472] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1235.782502] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1235.782533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1235.782563] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1235.782631] [ 1235.895933] loop5: detected capacity change from 0 to 40 [ 1235.899653] No source specified [ 1235.902530] FAULT_INJECTION: forcing a failure. [ 1235.902530] name failslab, interval 1, probability 0, space 0, times 0 [ 1235.903735] CPU: 1 UID: 0 PID: 9581 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1235.903788] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1235.903813] Call Trace: [ 1235.903824] [ 1235.903839] dump_stack_lvl+0xfa/0x120 [ 1235.903890] should_fail_ex+0x4d7/0x5e0 [ 1235.903963] ? alloc_vfsmnt+0x23/0x730 [ 1235.904007] should_failslab+0xc2/0x120 [ 1235.904084] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1235.904152] ? srso_return_thunk+0x5/0x5f [ 1235.904197] ? lock_release+0x20f/0x6f0 [ 1235.904269] alloc_vfsmnt+0x23/0x730 [ 1235.904322] clone_mnt+0x6c/0xd80 [ 1235.904373] ? srso_return_thunk+0x5/0x5f [ 1235.904420] ? srso_return_thunk+0x5/0x5f [ 1235.904474] copy_tree+0x3ba/0x960 [ 1235.904560] copy_mnt_ns+0x1ae/0xab0 [ 1235.904629] ? srso_return_thunk+0x5/0x5f [ 1235.904675] ? srso_return_thunk+0x5/0x5f [ 1235.904740] create_new_namespaces+0xd6/0xaf0 [ 1235.904797] ? srso_return_thunk+0x5/0x5f [ 1235.904841] ? security_capable+0x2f/0x90 [ 1235.904906] unshare_nsproxy_namespaces+0xc0/0x200 [ 1235.904973] ksys_unshare+0x46a/0xa10 [ 1235.905045] ? srso_return_thunk+0x5/0x5f [ 1235.905092] ? __pfx_ksys_unshare+0x10/0x10 [ 1235.905168] ? ksys_write+0x1b1/0x240 [ 1235.905260] __x64_sys_unshare+0x31/0x40 [ 1235.905334] do_syscall_64+0xbf/0x1d0 [ 1235.905389] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1235.905446] RIP: 0033:0x7f119793ab19 [ 1235.905476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1235.905521] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1235.905563] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1235.905594] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1235.905623] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1235.905652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1235.905681] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1235.905745] 07:28:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7fff) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000040)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 1235.959807] FAT-fs (loop5): bogus number of reserved sectors [ 1235.960415] FAT-fs (loop5): Can't find a valid FAT filesystem 07:28:04 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:28:04 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 48) 07:28:04 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x4000, 0x0) 07:28:05 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 51) 07:28:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) [ 1236.364814] loop5: detected capacity change from 0 to 40 [ 1236.385161] FAT-fs (loop5): bogus number of reserved sectors [ 1236.386528] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1236.524310] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:28:22 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x7900, 0x0) 07:28:22 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000011c0)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000001280), &(0x7f0000001300)=0x68) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) recvfrom(r0, &(0x7f0000000040)=""/4096, 0x1000, 0x100, &(0x7f0000001040)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) creat(&(0x7f0000001240)='./file0\x00', 0x55) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000001200)={'veth1_to_team\x00'}) openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) 07:28:22 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:28:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:28:22 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 49) 07:28:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00", 0xc}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:28:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x20, 0x0, &(0x7f0000000180), 0x5c003, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00,],@,lo\x00,,\\{,fowner=', @ANYRESDEC=0x0, @ANYBLOB="2c686173882c686173682c7569643e", @ANYRESDEC, @ANYBLOB=',\x00']) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r2, 0x5441, 0x7fff) dup2(r1, r2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = openat(r1, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x60) ioctl$TIOCGPTPEER(r3, 0x5441, 0x8001) 07:28:22 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 52) [ 1253.631540] No source specified [ 1253.634316] loop5: detected capacity change from 0 to 40 [ 1253.661072] FAT-fs (loop5): bogus number of reserved sectors [ 1253.662156] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1253.720545] FAULT_INJECTION: forcing a failure. [ 1253.720545] name failslab, interval 1, probability 0, space 0, times 0 [ 1253.722657] CPU: 0 UID: 0 PID: 9625 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1253.722751] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1253.722795] Call Trace: [ 1253.722815] [ 1253.722846] dump_stack_lvl+0xfa/0x120 [ 1253.722950] should_fail_ex+0x4d7/0x5e0 [ 1253.723099] should_failslab+0xc2/0x120 [ 1253.723251] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1253.723374] ? __pfx_lock_release+0x10/0x10 [ 1253.723503] ? kstrdup_const+0x57/0x80 [ 1253.723633] kstrdup+0x3e/0xc0 [ 1253.723720] kstrdup_const+0x57/0x80 [ 1253.723805] alloc_vfsmnt+0xe2/0x730 [ 1253.723924] clone_mnt+0x6c/0xd80 [ 1253.724015] ? srso_return_thunk+0x5/0x5f [ 1253.724107] ? srso_return_thunk+0x5/0x5f [ 1253.724224] copy_tree+0x3ba/0x960 [ 1253.724432] copy_mnt_ns+0x1ae/0xab0 [ 1253.724556] ? srso_return_thunk+0x5/0x5f [ 1253.724641] ? srso_return_thunk+0x5/0x5f [ 1253.724803] create_new_namespaces+0xd6/0xaf0 [ 1253.724909] ? srso_return_thunk+0x5/0x5f [ 1253.724988] ? security_capable+0x2f/0x90 [ 1253.725134] unshare_nsproxy_namespaces+0xc0/0x200 [ 1253.725271] ksys_unshare+0x46a/0xa10 [ 1253.725419] ? __pfx_ksys_unshare+0x10/0x10 [ 1253.725549] ? xfd_validate_state+0x51/0x180 [ 1253.725717] ? srso_return_thunk+0x5/0x5f [ 1253.725796] ? trace_x86_fpu_regs_activated+0x130/0x190 [ 1253.725969] __x64_sys_unshare+0x31/0x40 [ 1253.726106] do_syscall_64+0xbf/0x1d0 [ 1253.726218] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1253.726319] RIP: 0033:0x7f119793ab19 [ 1253.726373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1253.726453] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1253.726527] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1253.726583] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1253.726635] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1253.726687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1253.726738] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1253.726925] 07:28:22 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x7c00, 0x0) [ 1253.811424] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:28:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00", 0xc}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:28:22 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 50) 07:28:22 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000003dc0)=ANY=[@ANYBLOB="010000000100200018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) 07:28:22 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 53) 07:28:23 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x8004, 0x0) [ 1254.423989] loop5: detected capacity change from 0 to 40 [ 1254.475402] FAULT_INJECTION: forcing a failure. [ 1254.475402] name failslab, interval 1, probability 0, space 0, times 0 [ 1254.477472] CPU: 0 UID: 0 PID: 9642 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1254.477559] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1254.477599] Call Trace: [ 1254.477617] [ 1254.477644] dump_stack_lvl+0xfa/0x120 [ 1254.477735] should_fail_ex+0x4d7/0x5e0 [ 1254.477865] ? alloc_vfsmnt+0x23/0x730 [ 1254.477937] should_failslab+0xc2/0x120 [ 1254.478068] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1254.478181] ? srso_return_thunk+0x5/0x5f [ 1254.478199] FAT-fs (loop5): bogus number of reserved sectors [ 1254.478263] ? lock_release+0x20f/0x6f0 [ 1254.478408] alloc_vfsmnt+0x23/0x730 [ 1254.478508] clone_mnt+0x6c/0xd80 [ 1254.478590] ? srso_return_thunk+0x5/0x5f [ 1254.478674] ? srso_return_thunk+0x5/0x5f [ 1254.478781] copy_tree+0x3ba/0x960 [ 1254.478969] copy_mnt_ns+0x1ae/0xab0 [ 1254.479082] ? srso_return_thunk+0x5/0x5f [ 1254.479160] ? srso_return_thunk+0x5/0x5f [ 1254.479306] create_new_namespaces+0xd6/0xaf0 [ 1254.479403] ? srso_return_thunk+0x5/0x5f [ 1254.479475] ? security_capable+0x2f/0x90 [ 1254.479608] unshare_nsproxy_namespaces+0xc0/0x200 [ 1254.479733] ksys_unshare+0x46a/0xa10 [ 1254.479855] ? srso_return_thunk+0x5/0x5f [ 1254.479950] ? __pfx_ksys_unshare+0x10/0x10 [ 1254.480081] ? ksys_write+0x1b1/0x240 [ 1254.480281] __x64_sys_unshare+0x31/0x40 [ 1254.480406] do_syscall_64+0xbf/0x1d0 [ 1254.480508] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1254.480600] RIP: 0033:0x7f4b4b4c4b19 [ 1254.480650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1254.480722] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 07:28:23 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) [ 1254.480790] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1254.480841] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1254.480889] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1254.480936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1254.480983] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1254.481152] [ 1254.518980] FAT-fs (loop5): Can't find a valid FAT filesystem 07:28:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000040)={'filter\x00', 0x0, 0x0, 0x0, [0x100000001, 0x0, 0x800, 0x401, 0x3, 0x7fffffff]}, &(0x7f00000000c0)=0x78) bind$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_aout(r2, &(0x7f0000000100)={{0x10b, 0x4, 0x7, 0x28f, 0xbf, 0x6, 0x23f, 0x4}, "2b6602f607aa643796bbf9d284853202acb8e69d4aa375f1425409dad02aa16d2b97f6ad4b0364107b636ca7d15485320affd9e13e9adbfc35bbba60be4341a961619b9655a21691de8865e3d92fa74886dab7d87cabf10be928cf36f4b3e1dd97fde1f9fa56907f9a82a6404a152f1d53148a8ddf56f07e4d0fd99638726ed4cc3decabcdf6cc64c5a141075dee6d694b37119e7155856ea18f813685f68f5a79f954839d68eb6066439c7393de02aabf789e1929757169c36e8b0afe1c0ade67ccbd6ed6242cf771e0e9067c20d3cfcd9771ce7784d4371759a6b6822747ad29abdab901993787a522e133382758fdcb8ad3", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x813) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 1254.856680] lo: left promiscuous mode [ 1254.857662] lo: left allmulticast mode [ 1254.895572] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:28:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00", 0xc}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:28:43 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xf000, 0x0) 07:28:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:28:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) getsockopt$sock_buf(r2, 0x1, 0x1a, &(0x7f0000000600)=""/4096, &(0x7f0000000100)=0x1000) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='geneve1\x00') ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:28:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 54) 07:28:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000011c0)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000001280), &(0x7f0000001300)=0x68) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) recvfrom(r0, &(0x7f0000000040)=""/4096, 0x1000, 0x100, &(0x7f0000001040)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) creat(&(0x7f0000001240)='./file0\x00', 0x55) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000001200)={'veth1_to_team\x00'}) openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) 07:28:43 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 51) 07:28:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) [ 1274.913754] No source specified [ 1274.932861] loop5: detected capacity change from 0 to 40 [ 1274.947342] FAT-fs (loop5): bogus number of reserved sectors [ 1274.948468] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1274.959119] lo: entered promiscuous mode [ 1274.959620] lo: entered allmulticast mode 07:28:43 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 52) 07:28:43 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xf002, 0x0) [ 1275.159572] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:28:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 55) 07:28:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:28:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) socket$inet_udp(0x2, 0x2, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x30) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000140)={0x88, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2, 'wlc\x00', 0x31, 0x400040, 0x4c}, 0x2c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'geneve1\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 1275.376692] FAULT_INJECTION: forcing a failure. [ 1275.376692] name failslab, interval 1, probability 0, space 0, times 0 [ 1275.378588] CPU: 1 UID: 0 PID: 9684 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1275.378678] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1275.378719] Call Trace: [ 1275.378738] [ 1275.378764] dump_stack_lvl+0xfa/0x120 [ 1275.378847] should_fail_ex+0x4d7/0x5e0 [ 1275.378966] should_failslab+0xc2/0x120 [ 1275.379096] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1275.379212] ? __pfx_lock_release+0x10/0x10 [ 1275.379328] ? kstrdup_const+0x57/0x80 [ 1275.379422] kstrdup+0x3e/0xc0 [ 1275.379494] kstrdup_const+0x57/0x80 [ 1275.379567] alloc_vfsmnt+0xe2/0x730 [ 1275.379655] clone_mnt+0x6c/0xd80 [ 1275.379740] ? srso_return_thunk+0x5/0x5f [ 1275.379821] ? srso_return_thunk+0x5/0x5f [ 1275.379912] copy_tree+0x3ba/0x960 [ 1275.380059] copy_mnt_ns+0x1ae/0xab0 [ 1275.380176] ? srso_return_thunk+0x5/0x5f [ 1275.380253] ? srso_return_thunk+0x5/0x5f [ 1275.380363] create_new_namespaces+0xd6/0xaf0 [ 1275.380460] ? srso_return_thunk+0x5/0x5f [ 1275.380534] ? security_capable+0x2f/0x90 [ 1275.380642] unshare_nsproxy_namespaces+0xc0/0x200 [ 1275.380767] ksys_unshare+0x46a/0xa10 [ 1275.380889] ? srso_return_thunk+0x5/0x5f [ 1275.380969] ? __pfx_ksys_unshare+0x10/0x10 [ 1275.381097] ? ksys_write+0x1b1/0x240 [ 1275.381253] __x64_sys_unshare+0x31/0x40 [ 1275.381379] do_syscall_64+0xbf/0x1d0 [ 1275.381471] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1275.381567] RIP: 0033:0x7f4b4b4c4b19 [ 1275.381618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1275.381697] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1275.381767] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1275.381820] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1275.381869] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1275.381919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1275.381967] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1275.382075] [ 1275.438362] loop5: detected capacity change from 0 to 40 [ 1275.452703] FAT-fs (loop5): invalid media value (0x00) [ 1275.453295] FAT-fs (loop5): Can't find a valid FAT filesystem 07:28:44 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xf900, 0x0) 07:28:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) [ 1275.622524] FAULT_INJECTION: forcing a failure. [ 1275.622524] name failslab, interval 1, probability 0, space 0, times 0 [ 1275.623740] CPU: 0 UID: 0 PID: 9692 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1275.623789] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1275.623811] Call Trace: [ 1275.623822] [ 1275.623838] dump_stack_lvl+0xfa/0x120 [ 1275.623892] should_fail_ex+0x4d7/0x5e0 [ 1275.623967] ? alloc_vfsmnt+0x23/0x730 [ 1275.624008] should_failslab+0xc2/0x120 [ 1275.624083] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1275.624147] ? srso_return_thunk+0x5/0x5f [ 1275.624188] ? lock_release+0x20f/0x6f0 [ 1275.624275] alloc_vfsmnt+0x23/0x730 [ 1275.624330] clone_mnt+0x6c/0xd80 [ 1275.624376] ? srso_return_thunk+0x5/0x5f [ 1275.624423] ? srso_return_thunk+0x5/0x5f [ 1275.624482] copy_tree+0x3ba/0x960 [ 1275.624589] copy_mnt_ns+0x1ae/0xab0 [ 1275.624652] ? srso_return_thunk+0x5/0x5f [ 1275.624703] ? srso_return_thunk+0x5/0x5f [ 1275.624786] create_new_namespaces+0xd6/0xaf0 [ 1275.624840] ? srso_return_thunk+0x5/0x5f [ 1275.624881] ? security_capable+0x2f/0x90 [ 1275.624956] unshare_nsproxy_namespaces+0xc0/0x200 [ 1275.625025] ksys_unshare+0x46a/0xa10 [ 1275.625092] ? srso_return_thunk+0x5/0x5f [ 1275.625139] ? __pfx_ksys_unshare+0x10/0x10 [ 1275.625216] ? ksys_write+0x1b1/0x240 [ 1275.625329] __x64_sys_unshare+0x31/0x40 [ 1275.625399] do_syscall_64+0xbf/0x1d0 [ 1275.625456] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1275.625508] RIP: 0033:0x7f119793ab19 [ 1275.625536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1275.625577] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1275.625615] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1275.625643] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1275.625670] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1275.625696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1275.625723] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1275.625818] 07:28:44 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 53) 07:28:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:28:44 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 54) 07:28:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000011c0)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000001280), &(0x7f0000001300)=0x68) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) recvfrom(r0, &(0x7f0000000040)=""/4096, 0x1000, 0x100, &(0x7f0000001040)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) creat(&(0x7f0000001240)='./file0\x00', 0x55) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000001200)={'veth1_to_team\x00'}) [ 1275.845994] loop5: detected capacity change from 0 to 40 [ 1275.876306] FAT-fs (loop5): invalid media value (0x00) [ 1275.876862] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1276.094524] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:29:07 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xff0f, 0x0) 07:29:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000011c0)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000001280), &(0x7f0000001300)=0x68) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) recvfrom(r0, &(0x7f0000000040)=""/4096, 0x1000, 0x100, &(0x7f0000001040)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) creat(&(0x7f0000001240)='./file0\x00', 0x55) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000001200)={'veth1_to_team\x00'}) 07:29:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 56) 07:29:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:29:07 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 55) 07:29:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:29:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) socket$inet_udp(0x2, 0x2, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:29:07 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:29:07 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x30000, 0x0) [ 1298.471363] loop5: detected capacity change from 0 to 40 [ 1298.489433] syz-executor.4: attempt to access beyond end of device [ 1298.489433] loop4: rw=0, sector=0, nr_sectors = 1 limit=0 [ 1298.506925] FAT-fs (loop4): unable to read boot sector [ 1298.510927] FAT-fs (loop5): invalid media value (0x00) [ 1298.512119] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1298.541536] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1298.550724] FAULT_INJECTION: forcing a failure. [ 1298.550724] name failslab, interval 1, probability 0, space 0, times 0 [ 1298.552867] CPU: 0 UID: 0 PID: 9730 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1298.552963] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1298.553007] Call Trace: [ 1298.553027] [ 1298.553058] dump_stack_lvl+0xfa/0x120 [ 1298.553158] should_fail_ex+0x4d7/0x5e0 [ 1298.553310] ? alloc_vfsmnt+0x23/0x730 [ 1298.553390] should_failslab+0xc2/0x120 [ 1298.553546] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1298.553671] ? srso_return_thunk+0x5/0x5f [ 1298.553752] ? lock_release+0x20f/0x6f0 [ 1298.553914] alloc_vfsmnt+0x23/0x730 [ 1298.554024] clone_mnt+0x6c/0xd80 [ 1298.554116] ? srso_return_thunk+0x5/0x5f [ 1298.554209] ? srso_return_thunk+0x5/0x5f [ 1298.554328] copy_tree+0x3ba/0x960 [ 1298.554542] copy_mnt_ns+0x1ae/0xab0 [ 1298.554667] ? srso_return_thunk+0x5/0x5f [ 1298.554754] ? srso_return_thunk+0x5/0x5f [ 1298.554918] create_new_namespaces+0xd6/0xaf0 [ 1298.555026] ? srso_return_thunk+0x5/0x5f [ 1298.555106] ? security_capable+0x2f/0x90 [ 1298.555254] unshare_nsproxy_namespaces+0xc0/0x200 [ 1298.555393] ksys_unshare+0x46a/0xa10 [ 1298.555523] ? srso_return_thunk+0x5/0x5f [ 1298.555616] ? __pfx_ksys_unshare+0x10/0x10 [ 1298.555762] ? ksys_write+0x1b1/0x240 [ 1298.555987] __x64_sys_unshare+0x31/0x40 [ 1298.556126] do_syscall_64+0xbf/0x1d0 [ 1298.556239] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1298.556342] RIP: 0033:0x7f4b4b4c4b19 [ 1298.556397] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1298.556477] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1298.556553] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1298.556610] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1298.556662] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1298.556715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1298.556767] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1298.556961] 07:29:07 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'veth1_virt_wifi\x00'}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x181000, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000080)=0x2, 0x4) r2 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs2/binder-control\x00', 0x2, 0x0) fsetxattr$security_capability(r2, &(0x7f0000000180), &(0x7f0000000200)=@v1={0x1000000, [{0x77, 0x3f61}]}, 0xc, 0x2) 07:29:07 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x34000, 0x0) 07:29:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 57) 07:29:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000", 0x15}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:29:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) [ 1298.896794] FAULT_INJECTION: forcing a failure. [ 1298.896794] name failslab, interval 1, probability 0, space 0, times 0 [ 1298.897861] CPU: 1 UID: 0 PID: 9745 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1298.897912] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1298.897934] Call Trace: [ 1298.897945] [ 1298.897959] dump_stack_lvl+0xfa/0x120 [ 1298.898006] should_fail_ex+0x4d7/0x5e0 [ 1298.898071] should_failslab+0xc2/0x120 [ 1298.898142] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1298.898205] ? __pfx_lock_release+0x10/0x10 [ 1298.898268] ? kstrdup_const+0x57/0x80 [ 1298.898319] kstrdup+0x3e/0xc0 [ 1298.898358] kstrdup_const+0x57/0x80 [ 1298.898397] alloc_vfsmnt+0xe2/0x730 [ 1298.898444] clone_mnt+0x6c/0xd80 [ 1298.898491] ? srso_return_thunk+0x5/0x5f [ 1298.898535] ? srso_return_thunk+0x5/0x5f [ 1298.898583] copy_tree+0x3ba/0x960 [ 1298.898663] copy_mnt_ns+0x1ae/0xab0 [ 1298.898725] ? srso_return_thunk+0x5/0x5f [ 1298.898767] ? srso_return_thunk+0x5/0x5f [ 1298.898825] create_new_namespaces+0xd6/0xaf0 [ 1298.898885] ? srso_return_thunk+0x5/0x5f [ 1298.898925] ? security_capable+0x2f/0x90 [ 1298.898984] unshare_nsproxy_namespaces+0xc0/0x200 [ 1298.899053] ksys_unshare+0x46a/0xa10 [ 1298.899131] ? srso_return_thunk+0x5/0x5f [ 1298.899175] ? __pfx_ksys_unshare+0x10/0x10 [ 1298.899244] ? ksys_write+0x1b1/0x240 [ 1298.899328] __x64_sys_unshare+0x31/0x40 [ 1298.899396] do_syscall_64+0xbf/0x1d0 [ 1298.899446] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1298.899498] RIP: 0033:0x7f119793ab19 [ 1298.899528] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1298.899571] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1298.899609] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1298.899637] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1298.899664] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1298.899690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1298.899716] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1298.899774] [ 1298.923426] loop5: detected capacity change from 0 to 40 [ 1298.935339] FAT-fs (loop5): invalid media value (0x00) [ 1298.935846] FAT-fs (loop5): Can't find a valid FAT filesystem 07:29:07 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 56) [ 1299.147662] syz-executor.4: attempt to access beyond end of device [ 1299.147662] loop4: rw=0, sector=0, nr_sectors = 1 limit=0 [ 1299.148950] FAT-fs (loop4): unable to read boot sector 07:29:27 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x80000, 0x0) 07:29:27 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 58) 07:29:27 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:29:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/softnet_stat\x00') sendmsg$IPSET_CMD_TYPE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0xd, 0x6, 0x401, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x4080) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:29:27 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 57) 07:29:27 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000011c0)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000001280), &(0x7f0000001300)=0x68) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) recvfrom(r0, &(0x7f0000000040)=""/4096, 0x1000, 0x100, &(0x7f0000001040)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) creat(&(0x7f0000001240)='./file0\x00', 0x55) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000001200)={'veth1_to_team\x00'}) 07:29:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000", 0x15}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:29:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) [ 1318.556356] loop5: detected capacity change from 0 to 40 [ 1318.563453] FAT-fs (loop5): invalid media value (0x00) [ 1318.563925] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1318.565029] FAULT_INJECTION: forcing a failure. [ 1318.565029] name failslab, interval 1, probability 0, space 0, times 0 [ 1318.566057] CPU: 1 UID: 0 PID: 9768 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1318.566105] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1318.566128] Call Trace: [ 1318.566138] [ 1318.566152] dump_stack_lvl+0xfa/0x120 [ 1318.566207] should_fail_ex+0x4d7/0x5e0 [ 1318.566274] ? alloc_vfsmnt+0x23/0x730 [ 1318.566315] should_failslab+0xc2/0x120 [ 1318.566385] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1318.566447] ? srso_return_thunk+0x5/0x5f [ 1318.566488] ? lock_release+0x20f/0x6f0 [ 1318.566554] alloc_vfsmnt+0x23/0x730 [ 1318.566601] clone_mnt+0x6c/0xd80 [ 1318.566647] ? srso_return_thunk+0x5/0x5f [ 1318.566690] ? srso_return_thunk+0x5/0x5f [ 1318.566738] copy_tree+0x3ba/0x960 [ 1318.566818] copy_mnt_ns+0x1ae/0xab0 [ 1318.566881] ? srso_return_thunk+0x5/0x5f [ 1318.566923] ? srso_return_thunk+0x5/0x5f [ 1318.566982] create_new_namespaces+0xd6/0xaf0 [ 1318.567035] ? srso_return_thunk+0x5/0x5f [ 1318.567075] ? security_capable+0x2f/0x90 [ 1318.567134] unshare_nsproxy_namespaces+0xc0/0x200 [ 1318.567195] ksys_unshare+0x46a/0xa10 [ 1318.567263] ? srso_return_thunk+0x5/0x5f [ 1318.567306] ? __pfx_ksys_unshare+0x10/0x10 [ 1318.567375] ? ksys_write+0x1b1/0x240 [ 1318.567459] __x64_sys_unshare+0x31/0x40 [ 1318.567527] do_syscall_64+0xbf/0x1d0 [ 1318.567578] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1318.567630] RIP: 0033:0x7f4b4b4c4b19 [ 1318.567657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1318.567697] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1318.567735] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1318.567764] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1318.567790] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1318.567817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1318.567843] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1318.567901] 07:29:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000", 0x15}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) [ 1318.649758] syz-executor.4: attempt to access beyond end of device [ 1318.649758] loop4: rw=0, sector=0, nr_sectors = 1 limit=0 [ 1318.655988] FAT-fs (loop4): unable to read boot sector 07:29:27 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 58) [ 1318.715045] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:29:27 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 59) 07:29:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) socket$inet_udp(0x2, 0x2, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x4, 0x4) 07:29:27 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 59) 07:29:27 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x100000, 0x0) [ 1319.050499] loop5: detected capacity change from 0 to 40 [ 1319.093724] FAT-fs (loop5): invalid media value (0x00) [ 1319.094815] FAT-fs (loop5): Can't find a valid FAT filesystem 07:29:47 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x200000, 0x0) 07:29:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x5, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:29:47 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:29:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000011c0)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000001280), &(0x7f0000001300)=0x68) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) recvfrom(r0, &(0x7f0000000040)=""/4096, 0x1000, 0x100, &(0x7f0000001040)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) creat(&(0x7f0000001240)='./file0\x00', 0x55) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 07:29:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f8", 0x16}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:29:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 60) 07:29:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:29:47 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 60) [ 1339.008051] FAULT_INJECTION: forcing a failure. [ 1339.008051] name failslab, interval 1, probability 0, space 0, times 0 [ 1339.009274] CPU: 1 UID: 0 PID: 9805 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1339.009323] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1339.009346] Call Trace: [ 1339.009356] [ 1339.009370] dump_stack_lvl+0xfa/0x120 [ 1339.009418] should_fail_ex+0x4d7/0x5e0 [ 1339.009481] ? alloc_vfsmnt+0x23/0x730 [ 1339.009521] should_failslab+0xc2/0x120 [ 1339.009591] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1339.009653] ? srso_return_thunk+0x5/0x5f [ 1339.009694] ? lock_release+0x20f/0x6f0 [ 1339.009760] alloc_vfsmnt+0x23/0x730 [ 1339.009806] clone_mnt+0x6c/0xd80 [ 1339.009852] ? srso_return_thunk+0x5/0x5f [ 1339.009895] ? srso_return_thunk+0x5/0x5f [ 1339.009944] copy_tree+0x3ba/0x960 [ 1339.010022] copy_mnt_ns+0x1ae/0xab0 [ 1339.010090] ? srso_return_thunk+0x5/0x5f [ 1339.010132] ? srso_return_thunk+0x5/0x5f [ 1339.010190] create_new_namespaces+0xd6/0xaf0 [ 1339.010248] ? srso_return_thunk+0x5/0x5f [ 1339.010288] ? security_capable+0x2f/0x90 [ 1339.010347] unshare_nsproxy_namespaces+0xc0/0x200 [ 1339.010408] ksys_unshare+0x46a/0xa10 [ 1339.010474] ? srso_return_thunk+0x5/0x5f [ 1339.010517] ? __pfx_ksys_unshare+0x10/0x10 [ 1339.010586] ? ksys_write+0x1b1/0x240 [ 1339.010669] __x64_sys_unshare+0x31/0x40 [ 1339.010737] do_syscall_64+0xbf/0x1d0 [ 1339.010787] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1339.010839] RIP: 0033:0x7f4b4b4c4b19 [ 1339.010867] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1339.010915] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1339.010953] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1339.010982] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1339.011008] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1339.011035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1339.011061] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1339.011119] [ 1339.030840] FAULT_INJECTION: forcing a failure. [ 1339.030840] name failslab, interval 1, probability 0, space 0, times 0 [ 1339.031928] CPU: 1 UID: 0 PID: 9807 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1339.031975] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1339.031997] Call Trace: [ 1339.032006] [ 1339.032020] dump_stack_lvl+0xfa/0x120 [ 1339.032062] should_fail_ex+0x4d7/0x5e0 [ 1339.032128] ? alloc_vfsmnt+0x23/0x730 [ 1339.032168] should_failslab+0xc2/0x120 [ 1339.032241] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1339.032301] ? srso_return_thunk+0x5/0x5f [ 1339.032341] ? lock_release+0x20f/0x6f0 [ 1339.032406] alloc_vfsmnt+0x23/0x730 [ 1339.032452] clone_mnt+0x6c/0xd80 [ 1339.032498] ? srso_return_thunk+0x5/0x5f [ 1339.032541] ? srso_return_thunk+0x5/0x5f [ 1339.032590] copy_tree+0x3ba/0x960 [ 1339.032668] copy_mnt_ns+0x1ae/0xab0 [ 1339.032731] ? srso_return_thunk+0x5/0x5f [ 1339.032773] ? srso_return_thunk+0x5/0x5f [ 1339.032831] create_new_namespaces+0xd6/0xaf0 [ 1339.032883] ? srso_return_thunk+0x5/0x5f [ 1339.032923] ? security_capable+0x2f/0x90 [ 1339.032981] unshare_nsproxy_namespaces+0xc0/0x200 [ 1339.033041] ksys_unshare+0x46a/0xa10 [ 1339.033106] ? srso_return_thunk+0x5/0x5f [ 1339.033149] ? __pfx_ksys_unshare+0x10/0x10 [ 1339.033218] ? ksys_write+0x1b1/0x240 [ 1339.033302] __x64_sys_unshare+0x31/0x40 [ 1339.033370] do_syscall_64+0xbf/0x1d0 [ 1339.033419] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1339.033470] RIP: 0033:0x7f119793ab19 [ 1339.033497] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1339.033537] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1339.033575] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1339.033603] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1339.033629] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1339.033656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1339.033682] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1339.033740] 07:29:47 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 61) 07:29:47 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x400300, 0x0) [ 1339.127071] loop5: detected capacity change from 0 to 40 [ 1339.160612] FAT-fs (loop5): bogus number of FAT sectors [ 1339.161635] FAT-fs (loop5): Can't find a valid FAT filesystem 07:29:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 61) [ 1339.185160] syz-executor.4: attempt to access beyond end of device [ 1339.185160] loop4: rw=0, sector=0, nr_sectors = 1 limit=0 [ 1339.186557] FAT-fs (loop4): unable to read boot sector [ 1339.288968] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:29:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f8", 0x16}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:29:48 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xf0ffff, 0x0) 07:29:48 executing program 1: ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r1, 0x8008f513, &(0x7f0000000280)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r2, 0x5441, 0x7fff) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r3, 0x0) fchown(r2, r3, 0xffffffffffffffff) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r4, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) fcntl$notify(r0, 0x402, 0x10) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r5, 0x0) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f0000000240)=@v3={0x3000000, [{0xe833, 0x6f1c}, {0x1}], r5}, 0x18, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'geneve0\x00'}) 07:29:48 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1000000, 0x0) 07:29:48 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 62) [ 1339.579140] loop5: detected capacity change from 0 to 40 07:29:48 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x2000000, 0x0) [ 1339.599960] FAT-fs (loop5): bogus number of FAT sectors [ 1339.600537] FAT-fs (loop5): Can't find a valid FAT filesystem 07:29:48 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 62) [ 1339.698923] FAULT_INJECTION: forcing a failure. [ 1339.698923] name failslab, interval 1, probability 0, space 0, times 0 [ 1339.700022] CPU: 1 UID: 0 PID: 9836 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1339.700071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1339.700093] Call Trace: [ 1339.700103] [ 1339.700117] dump_stack_lvl+0xfa/0x120 [ 1339.700165] should_fail_ex+0x4d7/0x5e0 [ 1339.700234] should_failslab+0xc2/0x120 [ 1339.700305] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1339.700368] ? __pfx_lock_release+0x10/0x10 [ 1339.700428] ? kstrdup_const+0x57/0x80 [ 1339.700478] kstrdup+0x3e/0xc0 [ 1339.700517] kstrdup_const+0x57/0x80 [ 1339.700556] alloc_vfsmnt+0xe2/0x730 [ 1339.700604] clone_mnt+0x6c/0xd80 [ 1339.700649] ? srso_return_thunk+0x5/0x5f [ 1339.700694] ? srso_return_thunk+0x5/0x5f [ 1339.700742] copy_tree+0x3ba/0x960 [ 1339.700821] copy_mnt_ns+0x1ae/0xab0 [ 1339.700884] ? srso_return_thunk+0x5/0x5f [ 1339.700925] ? srso_return_thunk+0x5/0x5f [ 1339.700984] create_new_namespaces+0xd6/0xaf0 [ 1339.701037] ? srso_return_thunk+0x5/0x5f [ 1339.701077] ? security_capable+0x2f/0x90 [ 1339.701135] unshare_nsproxy_namespaces+0xc0/0x200 [ 1339.701196] ksys_unshare+0x46a/0xa10 [ 1339.701262] ? srso_return_thunk+0x5/0x5f [ 1339.701305] ? __pfx_ksys_unshare+0x10/0x10 [ 1339.701374] ? ksys_write+0x1b1/0x240 [ 1339.701458] __x64_sys_unshare+0x31/0x40 [ 1339.701525] do_syscall_64+0xbf/0x1d0 [ 1339.701576] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1339.701628] RIP: 0033:0x7f119793ab19 [ 1339.701655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1339.701696] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1339.701734] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1339.701762] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1339.701789] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1339.701816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1339.701842] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1339.701900] [ 1339.902545] FAULT_INJECTION: forcing a failure. [ 1339.902545] name failslab, interval 1, probability 0, space 0, times 0 [ 1339.903682] CPU: 1 UID: 0 PID: 9843 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1339.903730] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1339.903753] Call Trace: [ 1339.903763] [ 1339.903777] dump_stack_lvl+0xfa/0x120 [ 1339.903825] should_fail_ex+0x4d7/0x5e0 [ 1339.903889] should_failslab+0xc2/0x120 [ 1339.903960] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1339.904023] ? __pfx_lock_release+0x10/0x10 [ 1339.904082] ? kstrdup_const+0x57/0x80 [ 1339.904133] kstrdup+0x3e/0xc0 [ 1339.904172] kstrdup_const+0x57/0x80 [ 1339.904216] alloc_vfsmnt+0xe2/0x730 [ 1339.904263] clone_mnt+0x6c/0xd80 [ 1339.904309] ? srso_return_thunk+0x5/0x5f [ 1339.904353] ? srso_return_thunk+0x5/0x5f [ 1339.904402] copy_tree+0x3ba/0x960 [ 1339.904481] copy_mnt_ns+0x1ae/0xab0 [ 1339.904544] ? srso_return_thunk+0x5/0x5f [ 1339.904589] ? srso_return_thunk+0x5/0x5f [ 1339.904648] create_new_namespaces+0xd6/0xaf0 [ 1339.904700] ? srso_return_thunk+0x5/0x5f [ 1339.904740] ? security_capable+0x2f/0x90 [ 1339.904799] unshare_nsproxy_namespaces+0xc0/0x200 [ 1339.904860] ksys_unshare+0x46a/0xa10 [ 1339.904925] ? srso_return_thunk+0x5/0x5f [ 1339.904968] ? __pfx_ksys_unshare+0x10/0x10 [ 1339.905037] ? ksys_write+0x1b1/0x240 [ 1339.905121] __x64_sys_unshare+0x31/0x40 [ 1339.905189] do_syscall_64+0xbf/0x1d0 [ 1339.905239] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1339.905291] RIP: 0033:0x7f4b4b4c4b19 [ 1339.905318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1339.905359] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1339.905397] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1339.905425] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1339.905452] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1339.905478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1339.905504] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1339.905562] 07:30:24 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x3000000, 0x0) 07:30:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'netpci0\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:30:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f8", 0x16}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:30:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 63) 07:30:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:30:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 63) 07:30:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000011c0)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000001280), &(0x7f0000001300)=0x68) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) recvfrom(r0, &(0x7f0000000040)=""/4096, 0x1000, 0x100, &(0x7f0000001040)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) creat(&(0x7f0000001240)='./file0\x00', 0x55) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 07:30:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) [ 1375.950675] loop5: detected capacity change from 0 to 40 [ 1375.959468] syz-executor.4: attempt to access beyond end of device [ 1375.959468] loop4: rw=0, sector=0, nr_sectors = 1 limit=0 [ 1375.971473] FAT-fs (loop4): unable to read boot sector [ 1375.976006] FAT-fs (loop5): bogus number of FAT sectors [ 1375.977120] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1376.069291] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:30:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 64) 07:30:25 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x4000000, 0x0) 07:30:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:30:25 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 64) 07:30:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 1376.838585] loop5: detected capacity change from 0 to 40 07:30:25 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x5000000, 0x0) 07:30:25 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 65) [ 1377.134847] FAULT_INJECTION: forcing a failure. [ 1377.134847] name failslab, interval 1, probability 0, space 0, times 0 [ 1377.136692] CPU: 1 UID: 0 PID: 9883 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1377.136783] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1377.136825] Call Trace: [ 1377.136844] [ 1377.136870] dump_stack_lvl+0xfa/0x120 [ 1377.136955] should_fail_ex+0x4d7/0x5e0 [ 1377.137070] ? alloc_vfsmnt+0x23/0x730 [ 1377.137145] should_failslab+0xc2/0x120 [ 1377.137283] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1377.137397] ? srso_return_thunk+0x5/0x5f [ 1377.137473] ? lock_release+0x20f/0x6f0 [ 1377.137594] alloc_vfsmnt+0x23/0x730 [ 1377.137681] clone_mnt+0x6c/0xd80 [ 1377.137767] ? srso_return_thunk+0x5/0x5f [ 1377.137848] ? srso_return_thunk+0x5/0x5f [ 1377.137939] copy_tree+0x3ba/0x960 [ 1377.138087] copy_mnt_ns+0x1ae/0xab0 [ 1377.138204] ? srso_return_thunk+0x5/0x5f [ 1377.138282] ? srso_return_thunk+0x5/0x5f [ 1377.138392] create_new_namespaces+0xd6/0xaf0 [ 1377.138488] ? srso_return_thunk+0x5/0x5f [ 1377.138564] ? security_capable+0x2f/0x90 [ 1377.138673] unshare_nsproxy_namespaces+0xc0/0x200 [ 1377.138786] ksys_unshare+0x46a/0xa10 [ 1377.138908] ? srso_return_thunk+0x5/0x5f [ 1377.138989] ? __pfx_ksys_unshare+0x10/0x10 [ 1377.139118] ? ksys_write+0x1b1/0x240 [ 1377.139274] __x64_sys_unshare+0x31/0x40 [ 1377.139400] do_syscall_64+0xbf/0x1d0 [ 1377.139494] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1377.139589] RIP: 0033:0x7f4b4b4c4b19 [ 1377.139641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1377.139719] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1377.139790] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1377.139843] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1377.139893] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1377.139944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1377.139993] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1377.140102] 07:30:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 65) 07:30:46 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 66) 07:30:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) accept(r1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:30:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:30:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:30:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000011c0)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000001280), &(0x7f0000001300)=0x68) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) recvfrom(r0, &(0x7f0000000040)=""/4096, 0x1000, 0x100, &(0x7f0000001040)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) creat(&(0x7f0000001240)='./file0\x00', 0x55) 07:30:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:30:46 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x6000000, 0x0) [ 1397.609823] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:30:46 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x6010000, 0x0) [ 1397.634842] FAULT_INJECTION: forcing a failure. [ 1397.634842] name failslab, interval 1, probability 0, space 0, times 0 [ 1397.635943] CPU: 1 UID: 0 PID: 9900 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1397.635992] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1397.636016] Call Trace: [ 1397.636026] [ 1397.636041] dump_stack_lvl+0xfa/0x120 [ 1397.636088] should_fail_ex+0x4d7/0x5e0 [ 1397.636153] ? alloc_vfsmnt+0x23/0x730 [ 1397.636197] should_failslab+0xc2/0x120 [ 1397.636272] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1397.636334] ? srso_return_thunk+0x5/0x5f [ 1397.636376] ? lock_release+0x20f/0x6f0 [ 1397.636441] alloc_vfsmnt+0x23/0x730 [ 1397.636489] clone_mnt+0x6c/0xd80 [ 1397.636536] ? srso_return_thunk+0x5/0x5f [ 1397.636579] ? srso_return_thunk+0x5/0x5f [ 1397.636629] copy_tree+0x3ba/0x960 [ 1397.636708] copy_mnt_ns+0x1ae/0xab0 [ 1397.636771] ? srso_return_thunk+0x5/0x5f [ 1397.636813] ? srso_return_thunk+0x5/0x5f [ 1397.636872] create_new_namespaces+0xd6/0xaf0 [ 1397.636925] ? srso_return_thunk+0x5/0x5f [ 1397.636995] ? security_capable+0x2f/0x90 [ 1397.637055] unshare_nsproxy_namespaces+0xc0/0x200 [ 1397.637115] ksys_unshare+0x46a/0xa10 [ 1397.637182] ? srso_return_thunk+0x5/0x5f [ 1397.637225] ? __pfx_ksys_unshare+0x10/0x10 [ 1397.637294] ? ksys_write+0x1b1/0x240 [ 1397.637379] __x64_sys_unshare+0x31/0x40 [ 1397.637447] do_syscall_64+0xbf/0x1d0 [ 1397.637498] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1397.637550] RIP: 0033:0x7f119793ab19 [ 1397.637579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1397.637620] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1397.637659] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1397.637688] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1397.637715] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1397.637743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1397.637770] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1397.637829] [ 1397.655782] loop5: detected capacity change from 0 to 40 [ 1397.673689] syz-executor.4: attempt to access beyond end of device [ 1397.673689] loop4: rw=0, sector=0, nr_sectors = 1 limit=0 [ 1397.683302] FAT-fs (loop4): unable to read boot sector 07:30:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000040)={0x1, 0x100000000, 0x6}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000), 0x14) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000100)='net/fib_triestat\x00') ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:30:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:30:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 66) 07:30:46 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 67) 07:30:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:30:46 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x7000000, 0x0) [ 1398.019153] loop5: detected capacity change from 0 to 40 [ 1398.041107] lo: left promiscuous mode [ 1398.042149] lo: left allmulticast mode 07:30:47 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x9000000, 0x0) 07:30:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:30:47 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xf000000, 0x0) [ 1398.444473] FAULT_INJECTION: forcing a failure. [ 1398.444473] name failslab, interval 1, probability 0, space 0, times 0 [ 1398.446512] CPU: 0 UID: 0 PID: 9921 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1398.446609] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1398.446654] Call Trace: [ 1398.446674] [ 1398.446707] dump_stack_lvl+0xfa/0x120 [ 1398.446806] should_fail_ex+0x4d7/0x5e0 [ 1398.446952] ? alloc_vfsmnt+0x23/0x730 [ 1398.447031] should_failslab+0xc2/0x120 [ 1398.447179] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1398.447311] ? srso_return_thunk+0x5/0x5f [ 1398.447393] ? lock_release+0x20f/0x6f0 [ 1398.447555] alloc_vfsmnt+0x23/0x730 [ 1398.447665] clone_mnt+0x6c/0xd80 [ 1398.447758] ? srso_return_thunk+0x5/0x5f [ 1398.447851] ? srso_return_thunk+0x5/0x5f [ 1398.447971] copy_tree+0x3ba/0x960 [ 1398.448183] copy_mnt_ns+0x1ae/0xab0 [ 1398.448310] ? srso_return_thunk+0x5/0x5f [ 1398.448397] ? srso_return_thunk+0x5/0x5f [ 1398.448561] create_new_namespaces+0xd6/0xaf0 [ 1398.448669] ? srso_return_thunk+0x5/0x5f [ 1398.448750] ? security_capable+0x2f/0x90 [ 1398.448898] unshare_nsproxy_namespaces+0xc0/0x200 [ 1398.449052] ksys_unshare+0x46a/0xa10 [ 1398.449201] ? __pfx_ksys_unshare+0x10/0x10 [ 1398.449335] ? xfd_validate_state+0x51/0x180 [ 1398.449505] ? srso_return_thunk+0x5/0x5f [ 1398.449587] ? trace_x86_fpu_regs_activated+0x130/0x190 [ 1398.449764] __x64_sys_unshare+0x31/0x40 [ 1398.449903] do_syscall_64+0xbf/0x1d0 [ 1398.450017] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1398.450120] RIP: 0033:0x7f4b4b4c4b19 [ 1398.450176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1398.450259] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1398.450336] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1398.450395] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1398.450449] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1398.450503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1398.450556] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1398.450748] 07:30:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000011c0)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000001280), &(0x7f0000001300)=0x68) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) recvfrom(r0, &(0x7f0000000040)=""/4096, 0x1000, 0x100, &(0x7f0000001040)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) [ 1398.549137] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:30:47 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x11000000, 0x0) 07:30:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000100)={@rand_addr=0x64010100, @local}, 0xc) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) [ 1398.724546] loop5: detected capacity change from 0 to 40 07:31:09 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f00000011c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000001280), &(0x7f0000001300)=0x68) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) 07:31:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 68) 07:31:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:31:09 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x12000000, 0x0) 07:31:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 67) 07:31:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:31:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:31:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f0000000040)={0x1, 0x5, @status={[0x10000, 0x0, 0x2, 0x1, 0xb6, 0x1f89]}, [0x40, 0x8001, 0x100000000, 0x4, 0xfff, 0x1, 0x13, 0xffffffff80000000, 0x10001, 0x8, 0x5, 0x6, 0x0, 0x8, 0xee0, 0xff, 0x3, 0xe922, 0x401, 0x7ff, 0xfffffffffffffffb, 0x9, 0x6, 0x3ff, 0x5, 0x1, 0x3, 0x9, 0x5, 0x7f, 0x8, 0x7f, 0x9, 0x9, 0x4, 0x1, 0xfe15, 0x3, 0x0, 0x4, 0x7, 0x400, 0x6, 0x8, 0x10001, 0x8, 0xfffffffffffffbff, 0x81, 0x1, 0x0, 0x4, 0x7ff, 0x89, 0x1, 0x4, 0x5, 0x3, 0x0, 0x0, 0x5, 0x1000, 0x3, 0x1ff, 0x101]}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 1420.684802] loop5: detected capacity change from 0 to 40 [ 1420.711071] lo: entered promiscuous mode [ 1420.712040] lo: entered allmulticast mode [ 1420.724018] loop4: detected capacity change from 0 to 40 [ 1420.744330] FAULT_INJECTION: forcing a failure. [ 1420.744330] name failslab, interval 1, probability 0, space 0, times 0 [ 1420.746423] CPU: 0 UID: 0 PID: 9953 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1420.746522] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1420.746569] Call Trace: [ 1420.746590] [ 1420.746623] dump_stack_lvl+0xfa/0x120 [ 1420.746725] should_fail_ex+0x4d7/0x5e0 [ 1420.746880] should_failslab+0xc2/0x120 [ 1420.747031] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1420.747160] ? __pfx_lock_release+0x10/0x10 [ 1420.747303] ? kstrdup_const+0x57/0x80 [ 1420.747439] kstrdup+0x3e/0xc0 [ 1420.747530] kstrdup_const+0x57/0x80 [ 1420.747619] alloc_vfsmnt+0xe2/0x730 [ 1420.747734] clone_mnt+0x6c/0xd80 [ 1420.747828] ? srso_return_thunk+0x5/0x5f [ 1420.747925] ? srso_return_thunk+0x5/0x5f [ 1420.748047] copy_tree+0x3ba/0x960 [ 1420.748263] copy_mnt_ns+0x1ae/0xab0 [ 1420.748392] ? srso_return_thunk+0x5/0x5f [ 1420.748482] ? srso_return_thunk+0x5/0x5f [ 1420.748651] create_new_namespaces+0xd6/0xaf0 [ 1420.748761] ? srso_return_thunk+0x5/0x5f [ 1420.748843] ? security_capable+0x2f/0x90 [ 1420.748995] unshare_nsproxy_namespaces+0xc0/0x200 [ 1420.749139] ksys_unshare+0x46a/0xa10 [ 1420.749272] ? srso_return_thunk+0x5/0x5f [ 1420.749368] ? __pfx_ksys_unshare+0x10/0x10 [ 1420.749517] ? ksys_write+0x1b1/0x240 [ 1420.749761] __x64_sys_unshare+0x31/0x40 [ 1420.749904] do_syscall_64+0xbf/0x1d0 [ 1420.750020] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1420.750126] RIP: 0033:0x7f119793ab19 [ 1420.750182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1420.750267] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1420.750346] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1420.750405] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1420.750459] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1420.750515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1420.750569] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1420.750764] [ 1420.794082] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1420.815124] FAT-fs (loop4): bogus number of reserved sectors [ 1420.816470] FAT-fs (loop4): Can't find a valid FAT filesystem 07:31:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:31:09 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x14000000, 0x0) [ 1420.996018] loop5: detected capacity change from 0 to 40 07:31:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 69) 07:31:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0xe7, 0x4) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000040)="3ddb8f929d5aec688a22", 0xa, 0x0, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x22041, 0x0) bind$packet(r4, &(0x7f0000000000)={0x11, 0x1, r3}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:31:30 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f00000011c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000001280), &(0x7f0000001300)=0x68) 07:31:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:31:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:31:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:31:30 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 68) 07:31:30 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x15000000, 0x0) [ 1441.313123] loop5: detected capacity change from 0 to 40 [ 1441.385982] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1441.434261] loop4: detected capacity change from 0 to 40 [ 1441.456337] FAT-fs (loop4): bogus number of reserved sectors [ 1441.457473] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1441.503982] lo: left promiscuous mode [ 1441.504790] lo: left allmulticast mode 07:31:30 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 69) 07:31:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:31:30 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x16000000, 0x0) 07:31:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 70) 07:31:30 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f00000011c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000001280), &(0x7f0000001300)=0x68) 07:31:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'sit0\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:31:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:31:30 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f00000011c0)) socket$nl_xfrm(0x10, 0x3, 0x6) [ 1442.042322] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1442.054048] loop5: detected capacity change from 0 to 40 [ 1442.087044] FAULT_INJECTION: forcing a failure. [ 1442.087044] name failslab, interval 1, probability 0, space 0, times 0 [ 1442.089031] CPU: 1 UID: 0 PID: 10003 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1442.089129] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1442.089175] Call Trace: [ 1442.089202] [ 1442.089231] dump_stack_lvl+0xfa/0x120 [ 1442.089320] should_fail_ex+0x4d7/0x5e0 [ 1442.089445] ? alloc_vfsmnt+0x23/0x730 [ 1442.089524] should_failslab+0xc2/0x120 [ 1442.089665] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1442.089787] ? srso_return_thunk+0x5/0x5f [ 1442.089869] ? lock_release+0x20f/0x6f0 [ 1442.089999] alloc_vfsmnt+0x23/0x730 [ 1442.090092] clone_mnt+0x6c/0xd80 [ 1442.090185] ? srso_return_thunk+0x5/0x5f [ 1442.090271] ? srso_return_thunk+0x5/0x5f [ 1442.090369] copy_tree+0x3ba/0x960 [ 1442.090539] copy_mnt_ns+0x1ae/0xab0 [ 1442.090664] ? srso_return_thunk+0x5/0x5f [ 1442.090749] ? srso_return_thunk+0x5/0x5f [ 1442.090881] create_new_namespaces+0xd6/0xaf0 [ 1442.090995] ? srso_return_thunk+0x5/0x5f [ 1442.091076] ? security_capable+0x2f/0x90 [ 1442.091192] unshare_nsproxy_namespaces+0xc0/0x200 [ 1442.091315] ksys_unshare+0x46a/0xa10 [ 1442.091446] ? srso_return_thunk+0x5/0x5f [ 1442.091533] ? __pfx_ksys_unshare+0x10/0x10 [ 1442.091672] ? ksys_write+0x1b1/0x240 [ 1442.091839] __x64_sys_unshare+0x31/0x40 [ 1442.091976] do_syscall_64+0xbf/0x1d0 [ 1442.092076] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1442.092180] RIP: 0033:0x7f4b4b4c4b19 [ 1442.092235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1442.092318] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1442.092396] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1442.092454] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1442.092507] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1442.092561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1442.092615] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1442.092732] [ 1442.165826] lo: entered promiscuous mode [ 1442.166694] lo: entered allmulticast mode 07:31:31 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x17000000, 0x0) 07:31:31 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 70) [ 1442.435580] FAULT_INJECTION: forcing a failure. [ 1442.435580] name failslab, interval 1, probability 0, space 0, times 0 [ 1442.437060] CPU: 1 UID: 0 PID: 10015 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1442.437130] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1442.437162] Call Trace: [ 1442.437183] [ 1442.437203] dump_stack_lvl+0xfa/0x120 [ 1442.437268] should_fail_ex+0x4d7/0x5e0 [ 1442.437356] ? alloc_vfsmnt+0x23/0x730 [ 1442.437416] should_failslab+0xc2/0x120 [ 1442.437514] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1442.437600] ? srso_return_thunk+0x5/0x5f [ 1442.437656] ? lock_release+0x20f/0x6f0 [ 1442.437748] alloc_vfsmnt+0x23/0x730 [ 1442.437817] clone_mnt+0x6c/0xd80 [ 1442.437887] ? srso_return_thunk+0x5/0x5f [ 1442.437948] ? srso_return_thunk+0x5/0x5f [ 1442.438016] copy_tree+0x3ba/0x960 [ 1442.438127] copy_mnt_ns+0x1ae/0xab0 [ 1442.438215] ? srso_return_thunk+0x5/0x5f [ 1442.438274] ? srso_return_thunk+0x5/0x5f [ 1442.438356] create_new_namespaces+0xd6/0xaf0 [ 1442.438430] ? srso_return_thunk+0x5/0x5f [ 1442.438487] ? security_capable+0x2f/0x90 [ 1442.438581] unshare_nsproxy_namespaces+0xc0/0x200 [ 1442.438666] ksys_unshare+0x46a/0xa10 [ 1442.438757] ? srso_return_thunk+0x5/0x5f [ 1442.438823] ? __pfx_ksys_unshare+0x10/0x10 [ 1442.438923] ? ksys_write+0x1b1/0x240 [ 1442.439041] __x64_sys_unshare+0x31/0x40 [ 1442.439136] do_syscall_64+0xbf/0x1d0 [ 1442.439206] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1442.439278] RIP: 0033:0x7f119793ab19 [ 1442.439317] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1442.439375] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1442.439428] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1442.439469] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1442.439506] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1442.439544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1442.439581] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1442.439663] 07:31:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) 07:31:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) r1 = socket$inet6(0xa, 0x80000, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'batadv_slave_1\x00'}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:31:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 71) 07:31:52 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x18000000, 0x0) 07:31:52 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f00000011c0)) 07:31:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:31:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:31:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 71) [ 1464.049707] loop5: detected capacity change from 0 to 40 07:31:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(0x0, 0x80) 07:31:52 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x19000000, 0x0) 07:31:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 72) [ 1464.200881] loop4: detected capacity change from 0 to 40 [ 1464.224267] FAT-fs (loop4): bogus number of reserved sectors [ 1464.224854] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1464.355054] loop5: detected capacity change from 0 to 40 [ 1464.409848] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1464.430070] FAULT_INJECTION: forcing a failure. [ 1464.430070] name failslab, interval 1, probability 0, space 0, times 0 [ 1464.431083] CPU: 1 UID: 0 PID: 10045 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1464.431132] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1464.431155] Call Trace: [ 1464.431166] [ 1464.431184] dump_stack_lvl+0xfa/0x120 [ 1464.431231] should_fail_ex+0x4d7/0x5e0 [ 1464.431307] should_failslab+0xc2/0x120 [ 1464.431378] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1464.431441] ? __pfx_lock_release+0x10/0x10 [ 1464.431501] ? kstrdup_const+0x57/0x80 [ 1464.431552] kstrdup+0x3e/0xc0 [ 1464.431590] kstrdup_const+0x57/0x80 [ 1464.431630] alloc_vfsmnt+0xe2/0x730 [ 1464.431678] clone_mnt+0x6c/0xd80 [ 1464.431724] ? srso_return_thunk+0x5/0x5f [ 1464.431769] ? srso_return_thunk+0x5/0x5f [ 1464.431818] copy_tree+0x3ba/0x960 [ 1464.431897] copy_mnt_ns+0x1ae/0xab0 [ 1464.431960] ? srso_return_thunk+0x5/0x5f [ 1464.432002] ? srso_return_thunk+0x5/0x5f [ 1464.432061] create_new_namespaces+0xd6/0xaf0 [ 1464.432114] ? srso_return_thunk+0x5/0x5f [ 1464.432154] ? security_capable+0x2f/0x90 [ 1464.432214] unshare_nsproxy_namespaces+0xc0/0x200 [ 1464.432274] ksys_unshare+0x46a/0xa10 [ 1464.432341] ? srso_return_thunk+0x5/0x5f [ 1464.432384] ? __pfx_ksys_unshare+0x10/0x10 [ 1464.432453] ? ksys_write+0x1b1/0x240 [ 1464.432538] __x64_sys_unshare+0x31/0x40 [ 1464.432606] do_syscall_64+0xbf/0x1d0 [ 1464.432656] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1464.432709] RIP: 0033:0x7f119793ab19 [ 1464.432737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1464.432779] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1464.432818] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1464.432848] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1464.432875] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1464.432902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 07:31:53 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f00000011c0)) [ 1464.432928] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1464.432987] 07:31:53 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1a000000, 0x0) 07:31:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(0x0, 0x80) 07:31:53 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 72) [ 1464.755370] loop5: detected capacity change from 0 to 40 07:32:12 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:32:12 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000011c0)) 07:32:12 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) 07:32:12 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1b000000, 0x0) 07:32:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:32:12 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 73) 07:32:12 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 73) 07:32:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(0x0, 0x80) [ 1483.843774] loop5: detected capacity change from 0 to 40 07:32:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x0) [ 1483.915006] loop4: detected capacity change from 0 to 40 [ 1483.970129] FAULT_INJECTION: forcing a failure. [ 1483.970129] name failslab, interval 1, probability 0, space 0, times 0 [ 1483.972557] CPU: 0 UID: 0 PID: 10073 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1483.972656] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1483.972701] Call Trace: [ 1483.972723] [ 1483.972755] dump_stack_lvl+0xfa/0x120 [ 1483.972854] should_fail_ex+0x4d7/0x5e0 [ 1483.972999] ? alloc_vfsmnt+0x23/0x730 [ 1483.973080] should_failslab+0xc2/0x120 [ 1483.973234] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1483.973359] ? srso_return_thunk+0x5/0x5f [ 1483.973441] ? lock_release+0x20f/0x6f0 [ 1483.973603] alloc_vfsmnt+0x23/0x730 [ 1483.973714] clone_mnt+0x6c/0xd80 [ 1483.973806] ? srso_return_thunk+0x5/0x5f [ 1483.973899] ? srso_return_thunk+0x5/0x5f [ 1483.974019] copy_tree+0x3ba/0x960 [ 1483.974232] copy_mnt_ns+0x1ae/0xab0 [ 1483.974357] ? srso_return_thunk+0x5/0x5f [ 1483.974445] ? srso_return_thunk+0x5/0x5f [ 1483.974608] create_new_namespaces+0xd6/0xaf0 [ 1483.974717] ? srso_return_thunk+0x5/0x5f [ 1483.974798] ? security_capable+0x2f/0x90 [ 1483.974947] unshare_nsproxy_namespaces+0xc0/0x200 [ 1483.975087] ksys_unshare+0x46a/0xa10 [ 1483.975218] ? srso_return_thunk+0x5/0x5f [ 1483.975312] ? __pfx_ksys_unshare+0x10/0x10 [ 1483.975458] ? ksys_write+0x1b1/0x240 [ 1483.975599] ? srso_return_thunk+0x5/0x5f [ 1483.975757] __x64_sys_unshare+0x31/0x40 [ 1483.975897] do_syscall_64+0xbf/0x1d0 [ 1483.976025] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1483.976129] RIP: 0033:0x7f4b4b4c4b19 [ 1483.976183] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1483.976266] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1483.976343] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1483.976400] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1483.976454] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1483.976508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1483.976561] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1483.976752] [ 1484.019845] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1484.026360] FAT-fs (loop4): bogus number of reserved sectors [ 1484.027609] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1484.095610] loop5: detected capacity change from 0 to 40 07:32:13 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000011c0)) 07:32:13 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1c000000, 0x0) 07:32:13 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 74) 07:32:13 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1d000000, 0x0) 07:32:13 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 74) 07:32:13 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000040)={@broadcast, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:32:13 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000011c0)) 07:32:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:32:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0xa9b82ae9566cd6c5, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x5ae}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20044000}, 0x8091) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:32:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:32:32 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1e000000, 0x0) 07:32:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 75) 07:32:32 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 75) 07:32:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'sit0\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:32:32 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f00000011c0)) [ 1504.132901] lo: entered promiscuous mode [ 1504.133740] lo: entered allmulticast mode [ 1504.135673] loop4: detected capacity change from 0 to 40 [ 1504.146977] FAULT_INJECTION: forcing a failure. [ 1504.146977] name failslab, interval 1, probability 0, space 0, times 0 [ 1504.148542] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1504.148875] CPU: 1 UID: 0 PID: 10117 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1504.148969] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1504.149012] Call Trace: [ 1504.149031] [ 1504.149057] dump_stack_lvl+0xfa/0x120 [ 1504.149143] should_fail_ex+0x4d7/0x5e0 [ 1504.149272] ? alloc_vfsmnt+0x23/0x730 [ 1504.149345] should_failslab+0xc2/0x120 [ 1504.149478] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1504.149590] ? srso_return_thunk+0x5/0x5f [ 1504.149667] ? lock_release+0x20f/0x6f0 [ 1504.149790] alloc_vfsmnt+0x23/0x730 [ 1504.149888] clone_mnt+0x6c/0xd80 [ 1504.149975] ? srso_return_thunk+0x5/0x5f [ 1504.150056] ? srso_return_thunk+0x5/0x5f [ 1504.150148] copy_tree+0x3ba/0x960 [ 1504.150295] copy_mnt_ns+0x1ae/0xab0 [ 1504.150413] ? srso_return_thunk+0x5/0x5f [ 1504.150491] ? srso_return_thunk+0x5/0x5f [ 1504.150601] create_new_namespaces+0xd6/0xaf0 [ 1504.150699] ? srso_return_thunk+0x5/0x5f [ 1504.150774] ? security_capable+0x2f/0x90 [ 1504.150902] unshare_nsproxy_namespaces+0xc0/0x200 [ 1504.151017] ksys_unshare+0x46a/0xa10 [ 1504.151139] ? srso_return_thunk+0x5/0x5f [ 1504.151220] ? __pfx_ksys_unshare+0x10/0x10 [ 1504.151348] ? ksys_write+0x1b1/0x240 [ 1504.151504] __x64_sys_unshare+0x31/0x40 [ 1504.151631] do_syscall_64+0xbf/0x1d0 [ 1504.151724] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1504.151827] RIP: 0033:0x7f119793ab19 [ 1504.151884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1504.151963] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1504.152035] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1504.152090] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1504.152140] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1504.152190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1504.152244] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1504.152354] [ 1504.201941] FAT-fs (loop4): bogus number of reserved sectors [ 1504.203136] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1504.236933] FAULT_INJECTION: forcing a failure. [ 1504.236933] name failslab, interval 1, probability 0, space 0, times 0 [ 1504.238766] CPU: 0 UID: 0 PID: 10122 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1504.238857] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1504.238899] Call Trace: [ 1504.238918] [ 1504.238948] dump_stack_lvl+0xfa/0x120 [ 1504.239042] should_fail_ex+0x4d7/0x5e0 [ 1504.239183] ? alloc_vfsmnt+0x23/0x730 [ 1504.239258] should_failslab+0xc2/0x120 [ 1504.239396] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1504.239512] ? srso_return_thunk+0x5/0x5f [ 1504.239588] ? lock_release+0x20f/0x6f0 [ 1504.239739] alloc_vfsmnt+0x23/0x730 [ 1504.239843] clone_mnt+0x6c/0xd80 [ 1504.239928] ? srso_return_thunk+0x5/0x5f [ 1504.240016] ? srso_return_thunk+0x5/0x5f [ 1504.240126] copy_tree+0x3ba/0x960 [ 1504.240324] copy_mnt_ns+0x1ae/0xab0 [ 1504.240445] ? srso_return_thunk+0x5/0x5f [ 1504.240527] ? srso_return_thunk+0x5/0x5f [ 1504.240694] create_new_namespaces+0xd6/0xaf0 [ 1504.240796] ? srso_return_thunk+0x5/0x5f [ 1504.240871] ? security_capable+0x2f/0x90 [ 1504.241010] unshare_nsproxy_namespaces+0xc0/0x200 [ 1504.241140] ksys_unshare+0x46a/0xa10 [ 1504.241263] ? srso_return_thunk+0x5/0x5f [ 1504.241349] ? __pfx_ksys_unshare+0x10/0x10 [ 1504.241485] ? ksys_write+0x1b1/0x240 [ 1504.241694] __x64_sys_unshare+0x31/0x40 [ 1504.241824] do_syscall_64+0xbf/0x1d0 [ 1504.241930] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1504.242027] RIP: 0033:0x7f4b4b4c4b19 [ 1504.242079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1504.242156] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1504.242227] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1504.242281] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1504.242331] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1504.242382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1504.242432] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1504.242610] 07:32:33 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x1f000000, 0x0) 07:32:33 executing program 1: ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000001080)="3b127ae21a19168833e9e1e20f87d8e72afe197a300b395f5fdd35762ed9b2aa47e277a6a10272350b2b9ed5f12e0d2f710080ed7be7f73c052a34930d61dee8342fed04ce2103ac2545a375709cc8eb929cf298d7a0f6b616") perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x46, &(0x7f0000000080), 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) getsockopt$sock_buf(r2, 0x1, 0x1c, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:32:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:32:33 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 76) 07:32:33 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f00000011c0)) [ 1504.579507] loop5: detected capacity change from 0 to 40 [ 1504.639349] FAT-fs (loop5): bogus number of reserved sectors [ 1504.641078] FAT-fs (loop5): Can't find a valid FAT filesystem 07:32:33 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 76) 07:32:33 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x20000000, 0x0) 07:32:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:32:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:32:52 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) 07:32:52 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x21000000, 0x0) 07:32:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 77) 07:32:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 77) 07:32:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = signalfd4(r0, &(0x7f0000000040)={[0x51]}, 0x8, 0x800) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'ip6gretap0\x00'}) 07:32:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) [ 1523.541489] FAULT_INJECTION: forcing a failure. [ 1523.541489] name failslab, interval 1, probability 0, space 0, times 0 [ 1523.542543] CPU: 0 UID: 0 PID: 10159 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1523.542592] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1523.542616] Call Trace: [ 1523.542626] [ 1523.542642] dump_stack_lvl+0xfa/0x120 [ 1523.542695] should_fail_ex+0x4d7/0x5e0 [ 1523.542772] should_failslab+0xc2/0x120 [ 1523.542847] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1523.542911] ? __pfx_lock_release+0x10/0x10 [ 1523.542978] ? kstrdup_const+0x57/0x80 [ 1523.543046] kstrdup+0x3e/0xc0 [ 1523.543090] kstrdup_const+0x57/0x80 [ 1523.543134] alloc_vfsmnt+0xe2/0x730 [ 1523.543196] clone_mnt+0x6c/0xd80 [ 1523.543242] ? srso_return_thunk+0x5/0x5f [ 1523.543290] ? srso_return_thunk+0x5/0x5f [ 1523.543350] copy_tree+0x3ba/0x960 [ 1523.543456] copy_mnt_ns+0x1ae/0xab0 [ 1523.543519] ? srso_return_thunk+0x5/0x5f [ 1523.543563] ? srso_return_thunk+0x5/0x5f [ 1523.543645] create_new_namespaces+0xd6/0xaf0 [ 1523.543700] ? srso_return_thunk+0x5/0x5f [ 1523.543741] ? security_capable+0x2f/0x90 [ 1523.543816] unshare_nsproxy_namespaces+0xc0/0x200 [ 1523.543887] ksys_unshare+0x46a/0xa10 [ 1523.543953] ? srso_return_thunk+0x5/0x5f [ 1523.543999] ? __pfx_ksys_unshare+0x10/0x10 [ 1523.544072] ? ksys_write+0x1b1/0x240 [ 1523.544144] ? srso_return_thunk+0x5/0x5f [ 1523.544224] __x64_sys_unshare+0x31/0x40 [ 1523.544293] do_syscall_64+0xbf/0x1d0 [ 1523.544351] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1523.544404] RIP: 0033:0x7f119793ab19 [ 1523.544431] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1523.544473] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1523.544511] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1523.544541] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1523.544568] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1523.544596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1523.544622] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1523.544719] [ 1523.609653] FAULT_INJECTION: forcing a failure. [ 1523.609653] name failslab, interval 1, probability 0, space 0, times 0 [ 1523.611610] CPU: 1 UID: 0 PID: 10164 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1523.611707] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1523.611751] Call Trace: [ 1523.611772] [ 1523.611800] dump_stack_lvl+0xfa/0x120 [ 1523.611888] should_fail_ex+0x4d7/0x5e0 [ 1523.612013] should_failslab+0xc2/0x120 [ 1523.612153] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1523.612285] ? __pfx_lock_release+0x10/0x10 [ 1523.612402] ? kstrdup_const+0x57/0x80 [ 1523.612502] kstrdup+0x3e/0xc0 [ 1523.612579] kstrdup_const+0x57/0x80 [ 1523.612660] alloc_vfsmnt+0xe2/0x730 [ 1523.612754] clone_mnt+0x6c/0xd80 [ 1523.612846] ? srso_return_thunk+0x5/0x5f [ 1523.612934] ? srso_return_thunk+0x5/0x5f [ 1523.613033] copy_tree+0x3ba/0x960 [ 1523.613192] copy_mnt_ns+0x1ae/0xab0 [ 1523.613321] ? srso_return_thunk+0x5/0x5f [ 1523.613419] ? srso_return_thunk+0x5/0x5f [ 1523.613538] create_new_namespaces+0xd6/0xaf0 [ 1523.613642] ? srso_return_thunk+0x5/0x5f [ 1523.613723] ? security_capable+0x2f/0x90 [ 1523.613838] unshare_nsproxy_namespaces+0xc0/0x200 [ 1523.613960] ksys_unshare+0x46a/0xa10 [ 1523.614090] ? srso_return_thunk+0x5/0x5f [ 1523.614177] ? __pfx_ksys_unshare+0x10/0x10 [ 1523.614316] ? ksys_write+0x1b1/0x240 [ 1523.614484] __x64_sys_unshare+0x31/0x40 [ 1523.614619] do_syscall_64+0xbf/0x1d0 [ 1523.614719] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1523.614822] RIP: 0033:0x7f4b4b4c4b19 [ 1523.614876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1523.614959] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1523.615037] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1523.615095] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1523.615149] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1523.615202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1523.615256] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1523.615373] [ 1523.645813] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 07:32:52 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x22000000, 0x0) [ 1523.660948] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1523.669991] loop4: detected capacity change from 0 to 40 [ 1523.709348] FAT-fs (loop4): bogus number of reserved sectors [ 1523.709945] FAT-fs (loop4): Can't find a valid FAT filesystem 07:32:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x400001, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00'}) 07:32:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 78) 07:32:52 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x23000000, 0x0) 07:32:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 78) 07:32:52 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) [ 1524.077892] FAULT_INJECTION: forcing a failure. [ 1524.077892] name failslab, interval 1, probability 0, space 0, times 0 [ 1524.078972] CPU: 0 UID: 0 PID: 10181 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1524.079022] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1524.079045] Call Trace: [ 1524.079057] [ 1524.079072] dump_stack_lvl+0xfa/0x120 [ 1524.079126] should_fail_ex+0x4d7/0x5e0 [ 1524.079205] ? alloc_vfsmnt+0x23/0x730 [ 1524.079245] should_failslab+0xc2/0x120 [ 1524.079321] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1524.079384] ? srso_return_thunk+0x5/0x5f [ 1524.079426] ? lock_release+0x20f/0x6f0 [ 1524.079507] alloc_vfsmnt+0x23/0x730 [ 1524.079563] clone_mnt+0x6c/0xd80 [ 1524.079609] ? srso_return_thunk+0x5/0x5f [ 1524.079656] ? srso_return_thunk+0x5/0x5f [ 1524.079715] copy_tree+0x3ba/0x960 [ 1524.079821] copy_mnt_ns+0x1ae/0xab0 [ 1524.079885] ? srso_return_thunk+0x5/0x5f [ 1524.079928] ? srso_return_thunk+0x5/0x5f [ 1524.080011] create_new_namespaces+0xd6/0xaf0 [ 1524.080066] ? srso_return_thunk+0x5/0x5f [ 1524.080106] ? security_capable+0x2f/0x90 [ 1524.080181] unshare_nsproxy_namespaces+0xc0/0x200 [ 1524.080251] ksys_unshare+0x46a/0xa10 [ 1524.080317] ? srso_return_thunk+0x5/0x5f [ 1524.080364] ? __pfx_ksys_unshare+0x10/0x10 [ 1524.080437] ? ksys_write+0x1b1/0x240 [ 1524.080549] __x64_sys_unshare+0x31/0x40 [ 1524.080620] do_syscall_64+0xbf/0x1d0 [ 1524.080677] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1524.080730] RIP: 0033:0x7f4b4b4c4b19 [ 1524.080758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1524.080800] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1524.080838] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1524.080867] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1524.080894] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1524.080921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1524.080948] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1524.081044] 07:32:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 79) 07:32:53 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x24000000, 0x0) 07:32:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000011c0)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000001280), &(0x7f0000001300)=0x68) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) recvfrom(r0, &(0x7f0000000040)=""/4096, 0x1000, 0x100, &(0x7f0000001040)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) creat(&(0x7f0000001240)='./file0\x00', 0x55) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000001200)={'veth1_to_team\x00'}) 07:32:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:32:53 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x27020000, 0x0) [ 1524.505406] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:32:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockopt$inet_udp_int(r0, 0x11, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f00000000c0)={0x77359400}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:32:53 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x38010000, 0x0) 07:32:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:32:53 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 79) [ 1524.754543] loop4: detected capacity change from 0 to 40 [ 1524.770402] FAT-fs (loop4): bogus number of reserved sectors [ 1524.771488] FAT-fs (loop4): Can't find a valid FAT filesystem 07:33:13 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x39010000, 0x0) 07:33:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:33:13 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 80) 07:33:13 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="90370c025dcb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:33:13 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:33:13 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:33:13 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) 07:33:13 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 80) [ 1544.476445] loop4: detected capacity change from 0 to 40 [ 1544.488589] FAULT_INJECTION: forcing a failure. [ 1544.488589] name failslab, interval 1, probability 0, space 0, times 0 [ 1544.489720] CPU: 1 UID: 0 PID: 10226 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1544.489775] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1544.489805] Call Trace: [ 1544.489819] [ 1544.489835] dump_stack_lvl+0xfa/0x120 [ 1544.489886] should_fail_ex+0x4d7/0x5e0 [ 1544.489955] ? alloc_vfsmnt+0x23/0x730 [ 1544.490000] should_failslab+0xc2/0x120 [ 1544.490085] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1544.490157] ? srso_return_thunk+0x5/0x5f [ 1544.490203] ? lock_release+0x20f/0x6f0 [ 1544.490275] alloc_vfsmnt+0x23/0x730 [ 1544.490326] clone_mnt+0x6c/0xd80 [ 1544.490377] ? srso_return_thunk+0x5/0x5f [ 1544.490425] ? srso_return_thunk+0x5/0x5f [ 1544.490478] copy_tree+0x3ba/0x960 [ 1544.490565] copy_mnt_ns+0x1ae/0xab0 [ 1544.490635] ? srso_return_thunk+0x5/0x5f [ 1544.490681] ? srso_return_thunk+0x5/0x5f [ 1544.490745] create_new_namespaces+0xd6/0xaf0 [ 1544.490811] ? srso_return_thunk+0x5/0x5f [ 1544.490855] ? security_capable+0x2f/0x90 [ 1544.490920] unshare_nsproxy_namespaces+0xc0/0x200 [ 1544.490987] ksys_unshare+0x46a/0xa10 [ 1544.491059] ? srso_return_thunk+0x5/0x5f [ 1544.491106] ? __pfx_ksys_unshare+0x10/0x10 [ 1544.491183] ? ksys_write+0x1b1/0x240 [ 1544.491275] __x64_sys_unshare+0x31/0x40 [ 1544.491350] do_syscall_64+0xbf/0x1d0 [ 1544.491405] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1544.491462] RIP: 0033:0x7f4b4b4c4b19 [ 1544.491493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1544.491538] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1544.491581] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1544.491612] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1544.491642] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1544.491671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1544.491699] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1544.491763] [ 1544.514738] FAT-fs (loop4): bogus number of reserved sectors [ 1544.515377] FAT-fs (loop4): Can't find a valid FAT filesystem 07:33:13 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) [ 1544.629610] FAULT_INJECTION: forcing a failure. [ 1544.629610] name failslab, interval 1, probability 0, space 0, times 0 [ 1544.630682] CPU: 1 UID: 0 PID: 10234 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1544.630732] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1544.630755] Call Trace: [ 1544.630766] [ 1544.630780] dump_stack_lvl+0xfa/0x120 [ 1544.630828] should_fail_ex+0x4d7/0x5e0 [ 1544.630895] should_failslab+0xc2/0x120 [ 1544.630968] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1544.631034] ? __pfx_lock_release+0x10/0x10 [ 1544.631095] ? kstrdup_const+0x57/0x80 [ 1544.631152] kstrdup+0x3e/0xc0 [ 1544.631191] kstrdup_const+0x57/0x80 [ 1544.631232] alloc_vfsmnt+0xe2/0x730 [ 1544.631281] clone_mnt+0x6c/0xd80 [ 1544.631328] ? srso_return_thunk+0x5/0x5f [ 1544.631373] ? srso_return_thunk+0x5/0x5f [ 1544.631429] copy_tree+0x3ba/0x960 [ 1544.631511] copy_mnt_ns+0x1ae/0xab0 [ 1544.631576] ? srso_return_thunk+0x5/0x5f [ 1544.631620] ? srso_return_thunk+0x5/0x5f [ 1544.631681] create_new_namespaces+0xd6/0xaf0 [ 1544.631735] ? srso_return_thunk+0x5/0x5f [ 1544.631776] ? security_capable+0x2f/0x90 [ 1544.631837] unshare_nsproxy_namespaces+0xc0/0x200 [ 1544.631899] ksys_unshare+0x46a/0xa10 [ 1544.631968] ? srso_return_thunk+0x5/0x5f [ 1544.632012] ? __pfx_ksys_unshare+0x10/0x10 [ 1544.632083] ? ksys_write+0x1b1/0x240 [ 1544.632170] __x64_sys_unshare+0x31/0x40 [ 1544.632240] do_syscall_64+0xbf/0x1d0 [ 1544.632292] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1544.632346] RIP: 0033:0x7f119793ab19 [ 1544.632375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1544.632418] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1544.632458] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1544.632488] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1544.632516] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1544.632543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1544.632571] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1544.632631] [ 1544.663181] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 07:33:13 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 81) 07:33:13 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) statx(r1, &(0x7f0000000040)='./file0\x00', 0x2000, 0x10, &(0x7f0000000080)) [ 1544.798560] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:33:13 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 81) 07:33:13 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x3f000000, 0x0) 07:33:13 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) 07:33:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:33:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:33:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0600000000000000000066696c653000"]) setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f00000001c0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @remote}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x62441, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'wg0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:33:34 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 82) 07:33:34 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) 07:33:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 82) 07:33:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:33:34 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x40000000, 0x0) [ 1565.731063] loop4: detected capacity change from 0 to 40 [ 1565.751121] FAT-fs (loop4): bogus number of reserved sectors [ 1565.752142] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1565.818877] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1565.862665] FAULT_INJECTION: forcing a failure. [ 1565.862665] name failslab, interval 1, probability 0, space 0, times 0 [ 1565.864813] CPU: 0 UID: 0 PID: 10273 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1565.864910] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1565.864956] Call Trace: [ 1565.864977] [ 1565.865008] dump_stack_lvl+0xfa/0x120 [ 1565.865110] should_fail_ex+0x4d7/0x5e0 [ 1565.865269] should_failslab+0xc2/0x120 [ 1565.865419] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1565.865546] ? __pfx_lock_release+0x10/0x10 [ 1565.865678] ? kstrdup_const+0x57/0x80 [ 1565.865812] kstrdup+0x3e/0xc0 [ 1565.865900] kstrdup_const+0x57/0x80 [ 1565.865987] alloc_vfsmnt+0xe2/0x730 [ 1565.866100] clone_mnt+0x6c/0xd80 [ 1565.866192] ? srso_return_thunk+0x5/0x5f [ 1565.866287] ? srso_return_thunk+0x5/0x5f [ 1565.866406] copy_tree+0x3ba/0x960 [ 1565.866619] copy_mnt_ns+0x1ae/0xab0 [ 1565.866745] ? srso_return_thunk+0x5/0x5f [ 1565.866853] ? srso_return_thunk+0x5/0x5f [ 1565.867018] create_new_namespaces+0xd6/0xaf0 [ 1565.867127] ? srso_return_thunk+0x5/0x5f [ 1565.867207] ? security_capable+0x2f/0x90 [ 1565.867357] unshare_nsproxy_namespaces+0xc0/0x200 [ 1565.867498] ksys_unshare+0x46a/0xa10 [ 1565.867629] ? srso_return_thunk+0x5/0x5f [ 1565.867723] ? __pfx_ksys_unshare+0x10/0x10 [ 1565.867869] ? ksys_write+0x1b1/0x240 [ 1565.868095] __x64_sys_unshare+0x31/0x40 [ 1565.868238] do_syscall_64+0xbf/0x1d0 [ 1565.868352] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1565.868456] RIP: 0033:0x7f4b4b4c4b19 [ 1565.868511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1565.868594] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1565.868672] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1565.868729] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1565.868783] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1565.868838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1565.868891] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1565.869084] [ 1565.914493] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 07:33:34 executing program 3: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x105802, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) [ 1565.942019] FAULT_INJECTION: forcing a failure. [ 1565.942019] name failslab, interval 1, probability 0, space 0, times 0 [ 1565.943989] CPU: 1 UID: 0 PID: 10276 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1565.944084] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1565.944130] Call Trace: [ 1565.944155] [ 1565.944182] dump_stack_lvl+0xfa/0x120 [ 1565.944269] should_fail_ex+0x4d7/0x5e0 [ 1565.944395] should_failslab+0xc2/0x120 [ 1565.944527] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1565.944646] ? __pfx_lock_release+0x10/0x10 [ 1565.944757] ? kstrdup_const+0x57/0x80 [ 1565.944851] kstrdup+0x3e/0xc0 [ 1565.944924] kstrdup_const+0x57/0x80 [ 1565.944999] alloc_vfsmnt+0xe2/0x730 [ 1565.945087] clone_mnt+0x6c/0xd80 [ 1565.945173] ? srso_return_thunk+0x5/0x5f [ 1565.945256] ? srso_return_thunk+0x5/0x5f [ 1565.945347] copy_tree+0x3ba/0x960 [ 1565.945495] copy_mnt_ns+0x1ae/0xab0 [ 1565.945613] ? srso_return_thunk+0x5/0x5f [ 1565.945691] ? srso_return_thunk+0x5/0x5f [ 1565.945801] create_new_namespaces+0xd6/0xaf0 [ 1565.945900] ? srso_return_thunk+0x5/0x5f [ 1565.945976] ? security_capable+0x2f/0x90 [ 1565.946085] unshare_nsproxy_namespaces+0xc0/0x200 [ 1565.946199] ksys_unshare+0x46a/0xa10 [ 1565.946321] ? srso_return_thunk+0x5/0x5f [ 1565.946402] ? __pfx_ksys_unshare+0x10/0x10 [ 1565.946531] ? ksys_write+0x1b1/0x240 [ 1565.946688] __x64_sys_unshare+0x31/0x40 [ 1565.946825] do_syscall_64+0xbf/0x1d0 [ 1565.946918] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1565.947016] RIP: 0033:0x7f119793ab19 [ 1565.947067] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1565.947144] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1565.947216] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1565.947271] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1565.947321] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1565.947371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1565.947421] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1565.947530] 07:33:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = fspick(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) fcntl$notify(r1, 0x402, 0x8) r2 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000100)) write$binfmt_misc(r2, &(0x7f0000000140)={'syz1', "bfe81bdf3c703558d573e16bf4254086314644923857341a05b9eac41868d8981ba14f7fcdd8cbd1d5968c5821de7fb60fd8f089e8bd207011bdaf4886ad044f539df94336b32c4486a5f3695a37cd5e7419891084ba5f6a5eb984bda279d0db609012da91a36ad419a8f7d1d1c9f06aaf38c4a6963154d9012075a25ae9069dd3eb6841b55fec5af4bce29f02023b98ae6c31ac03f4680bae6cc9b40b60ad437c03ce6f761983a3cda76ff19f57ba6f2c73cc10c3d55a5bbe63904a479b3beee428b253501706eb94c6010d0676c4a058fbc56773e86f5138bef4048eff2fa202a6190194bcd3f81f9352e7dd13a238f268d33e9f75"}, 0xfa) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000080)={r4, 0x1, 0x6, @remote}, 0x10) 07:33:35 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x79000000, 0x0) 07:33:35 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 83) 07:33:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 83) 07:33:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:33:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) [ 1566.725792] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1566.834611] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 07:33:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00", 0xc}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:33:55 executing program 3: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x105802, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) 07:33:55 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:33:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth1_virt_wifi\x00'}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000100)=0xe7, 0x4) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendto$packet(r2, &(0x7f0000000040)="3ddb8f929d5aec688a22", 0xa, 0x0, &(0x7f00000000c0)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000240)={'syztnl2\x00', &(0x7f0000000140)={'gre0\x00', r4, 0x7800, 0x40, 0x8001, 0x30, {{0x30, 0x4, 0x1, 0x1, 0xc0, 0x65, 0x0, 0x8, 0x2f, 0x0, @remote, @loopback, {[@rr={0x7, 0xf, 0x60, [@rand_addr=0x64010101, @rand_addr=0x64010101, @rand_addr=0x64010102]}, @noop, @lsrr={0x83, 0x1f, 0x81, [@broadcast, @rand_addr=0x64010102, @loopback, @private=0xa010102, @multicast1, @broadcast, @broadcast]}, @end, @ssrr={0x89, 0x7, 0xa6, [@local]}, @cipso={0x86, 0x4e, 0x3, [{0x7, 0x8, "318703fc5332"}, {0x1, 0x5, "d91a7e"}, {0x5, 0x11, "aaea6fd7b5421b7bd90192c7c57e2c"}, {0x7, 0xa, "cec3824058426f85"}, {0x2, 0x8, "c70f51a13e56"}, {0x5, 0x2}, {0x6, 0x12, "235cd097cda1c4113cb1d7a0784b756f"}, {0x2, 0x4, 'd4'}]}, @timestamp_prespec={0x44, 0x24, 0x29, 0x3, 0x8, [{@empty, 0x2}, {@local}, {@multicast1, 0x6}, {@multicast1, 0xfffffffc}]}]}}}}}) bind$packet(r2, &(0x7f0000000000)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f00000000c0)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'ip6gre0\x00'}) 07:33:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 84) 07:33:55 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 84) 07:33:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:33:55 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x7c000000, 0x0) [ 1587.232732] loop4: detected capacity change from 0 to 40 [ 1587.259573] FAT-fs (loop4): bogus number of reserved sectors [ 1587.260646] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1587.346824] loop5: detected capacity change from 0 to 40 [ 1587.449470] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:33:56 executing program 3: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x105802, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) 07:33:56 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 85) 07:33:56 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x80040000, 0x0) 07:33:56 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) [ 1587.890599] FAULT_INJECTION: forcing a failure. [ 1587.890599] name failslab, interval 1, probability 0, space 0, times 0 [ 1587.892538] CPU: 0 UID: 0 PID: 10329 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1587.892642] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1587.892685] Call Trace: [ 1587.892704] [ 1587.892734] dump_stack_lvl+0xfa/0x120 [ 1587.892828] should_fail_ex+0x4d7/0x5e0 [ 1587.892963] ? alloc_vfsmnt+0x23/0x730 [ 1587.893038] should_failslab+0xc2/0x120 [ 1587.893185] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1587.893303] ? srso_return_thunk+0x5/0x5f [ 1587.893379] ? lock_release+0x20f/0x6f0 [ 1587.893550] alloc_vfsmnt+0x23/0x730 [ 1587.893681] clone_mnt+0x6c/0xd80 [ 1587.893787] ? srso_return_thunk+0x5/0x5f [ 1587.893876] ? srso_return_thunk+0x5/0x5f [ 1587.893992] copy_tree+0x3ba/0x960 [ 1587.894190] copy_mnt_ns+0x1ae/0xab0 [ 1587.894307] ? srso_return_thunk+0x5/0x5f [ 1587.894388] ? srso_return_thunk+0x5/0x5f [ 1587.894553] create_new_namespaces+0xd6/0xaf0 [ 1587.894657] ? srso_return_thunk+0x5/0x5f [ 1587.894731] ? security_capable+0x2f/0x90 [ 1587.894870] unshare_nsproxy_namespaces+0xc0/0x200 [ 1587.894999] ksys_unshare+0x46a/0xa10 [ 1587.895122] ? srso_return_thunk+0x5/0x5f [ 1587.895208] ? __pfx_ksys_unshare+0x10/0x10 [ 1587.895344] ? ksys_write+0x1b1/0x240 [ 1587.895565] __x64_sys_unshare+0x31/0x40 [ 1587.895711] do_syscall_64+0xbf/0x1d0 [ 1587.895818] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1587.895915] RIP: 0033:0x7f119793ab19 [ 1587.895966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1587.896044] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1587.896115] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1587.896169] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1587.896220] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1587.896270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1587.896320] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1587.896509] 07:33:56 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 85) [ 1588.406729] FAULT_INJECTION: forcing a failure. [ 1588.406729] name failslab, interval 1, probability 0, space 0, times 0 [ 1588.408902] CPU: 1 UID: 0 PID: 10340 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1588.408994] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1588.409036] Call Trace: [ 1588.409056] [ 1588.409081] dump_stack_lvl+0xfa/0x120 [ 1588.409175] should_fail_ex+0x4d7/0x5e0 [ 1588.409290] ? alloc_vfsmnt+0x23/0x730 [ 1588.409365] should_failslab+0xc2/0x120 [ 1588.409495] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1588.409608] ? srso_return_thunk+0x5/0x5f [ 1588.409685] ? lock_release+0x20f/0x6f0 [ 1588.409805] alloc_vfsmnt+0x23/0x730 [ 1588.409892] clone_mnt+0x6c/0xd80 [ 1588.409977] ? srso_return_thunk+0x5/0x5f [ 1588.410059] ? srso_return_thunk+0x5/0x5f [ 1588.410149] copy_tree+0x3ba/0x960 [ 1588.410297] copy_mnt_ns+0x1ae/0xab0 [ 1588.410414] ? srso_return_thunk+0x5/0x5f [ 1588.410492] ? srso_return_thunk+0x5/0x5f [ 1588.410601] create_new_namespaces+0xd6/0xaf0 [ 1588.410699] ? srso_return_thunk+0x5/0x5f [ 1588.410775] ? security_capable+0x2f/0x90 [ 1588.410883] unshare_nsproxy_namespaces+0xc0/0x200 [ 1588.411001] ksys_unshare+0x46a/0xa10 [ 1588.411122] ? srso_return_thunk+0x5/0x5f [ 1588.411204] ? __pfx_ksys_unshare+0x10/0x10 [ 1588.411333] ? ksys_write+0x1b1/0x240 [ 1588.411489] __x64_sys_unshare+0x31/0x40 [ 1588.411627] do_syscall_64+0xbf/0x1d0 [ 1588.411719] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1588.411816] RIP: 0033:0x7f4b4b4c4b19 [ 1588.411868] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1588.411947] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1588.412023] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1588.412077] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1588.412128] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1588.412178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1588.412228] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1588.412338] [ 1588.467083] syz-executor.4 (10308) used greatest stack depth: 23280 bytes left 07:34:17 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 86) 07:34:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00", 0xc}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:34:17 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x8cffffff, 0x0) 07:34:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:34:17 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:34:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00", 0xc}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:34:17 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) 07:34:17 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 86) [ 1608.827611] loop4: detected capacity change from 0 to 40 [ 1608.838810] FAT-fs (loop4): bogus number of reserved sectors [ 1608.839429] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1608.868867] loop5: detected capacity change from 0 to 40 [ 1608.897844] FAT-fs (loop5): bogus number of reserved sectors [ 1608.898954] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1608.940611] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:34:17 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 87) 07:34:17 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x9effffff, 0x0) 07:34:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = accept(r0, &(0x7f0000000240)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f00000002c0)=0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000003c0)={'ip_vti0\x00', &(0x7f0000000300)={'ip_vti0\x00', 0x0, 0x90, 0x20, 0x4, 0x10000, {{0x1b, 0x4, 0x3, 0x2d, 0x6c, 0x67, 0x0, 0x1f, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x11}, @empty, {[@generic={0x89, 0xb, "5835f2db450331aa6c"}, @generic={0x82, 0x9, "6291c595d477ff"}, @timestamp_addr={0x44, 0x44, 0xfa, 0x1, 0x9, [{@loopback, 0x9}, {@multicast2}, {@private=0xa010100, 0x10000}, {@multicast2, 0x3}, {@remote, 0x5}, {@loopback, 0x7f}, {@multicast2, 0x2}, {@broadcast, 0x8001}]}]}}}}}) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = accept$unix(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0x6e) setsockopt$sock_timeval(r3, 0x1, 0x14, &(0x7f0000000200)={0x0, 0xea60}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r4, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 1609.169639] FAULT_INJECTION: forcing a failure. [ 1609.169639] name failslab, interval 1, probability 0, space 0, times 0 [ 1609.171802] CPU: 1 UID: 0 PID: 10364 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1609.171900] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1609.171946] Call Trace: [ 1609.171966] [ 1609.171994] dump_stack_lvl+0xfa/0x120 [ 1609.172085] should_fail_ex+0x4d7/0x5e0 [ 1609.172223] should_failslab+0xc2/0x120 [ 1609.172379] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1609.172515] ? __pfx_lock_release+0x10/0x10 [ 1609.172638] ? kstrdup_const+0x57/0x80 [ 1609.172739] kstrdup+0x3e/0xc0 [ 1609.172816] kstrdup_const+0x57/0x80 [ 1609.172897] alloc_vfsmnt+0xe2/0x730 [ 1609.172990] clone_mnt+0x6c/0xd80 [ 1609.173082] ? srso_return_thunk+0x5/0x5f [ 1609.173168] ? srso_return_thunk+0x5/0x5f [ 1609.173267] copy_tree+0x3ba/0x960 [ 1609.173424] copy_mnt_ns+0x1ae/0xab0 [ 1609.173570] ? srso_return_thunk+0x5/0x5f [ 1609.173654] ? srso_return_thunk+0x5/0x5f [ 1609.173773] create_new_namespaces+0xd6/0xaf0 [ 1609.173877] ? srso_return_thunk+0x5/0x5f [ 1609.173958] ? security_capable+0x2f/0x90 [ 1609.174074] unshare_nsproxy_namespaces+0xc0/0x200 [ 1609.174196] ksys_unshare+0x46a/0xa10 [ 1609.174327] ? srso_return_thunk+0x5/0x5f [ 1609.174413] ? __pfx_ksys_unshare+0x10/0x10 [ 1609.174563] ? ksys_write+0x1b1/0x240 [ 1609.174731] __x64_sys_unshare+0x31/0x40 [ 1609.174867] do_syscall_64+0xbf/0x1d0 [ 1609.174968] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1609.175070] RIP: 0033:0x7f4b4b4c4b19 [ 1609.175127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1609.175209] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1609.175286] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1609.175344] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1609.175398] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1609.175452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1609.175516] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1609.175634] 07:34:18 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) 07:34:18 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 87) 07:34:18 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xa7ffffff, 0x0) 07:34:18 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 88) [ 1609.717503] FAULT_INJECTION: forcing a failure. [ 1609.717503] name failslab, interval 1, probability 0, space 0, times 0 [ 1609.719971] CPU: 0 UID: 0 PID: 10378 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1609.720065] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1609.720109] Call Trace: [ 1609.720128] [ 1609.720164] dump_stack_lvl+0xfa/0x120 [ 1609.720260] should_fail_ex+0x4d7/0x5e0 [ 1609.720414] should_failslab+0xc2/0x120 [ 1609.720556] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1609.720676] ? __pfx_lock_release+0x10/0x10 [ 1609.720801] ? kstrdup_const+0x57/0x80 [ 1609.720928] kstrdup+0x3e/0xc0 [ 1609.721012] kstrdup_const+0x57/0x80 [ 1609.721095] alloc_vfsmnt+0xe2/0x730 [ 1609.721202] clone_mnt+0x6c/0xd80 [ 1609.721290] ? srso_return_thunk+0x5/0x5f [ 1609.721380] ? srso_return_thunk+0x5/0x5f [ 1609.721494] copy_tree+0x3ba/0x960 [ 1609.721695] copy_mnt_ns+0x1ae/0xab0 [ 1609.721816] ? srso_return_thunk+0x5/0x5f [ 1609.721900] ? srso_return_thunk+0x5/0x5f [ 1609.722056] create_new_namespaces+0xd6/0xaf0 [ 1609.722159] ? srso_return_thunk+0x5/0x5f [ 1609.722236] ? security_capable+0x2f/0x90 [ 1609.722376] unshare_nsproxy_namespaces+0xc0/0x200 [ 1609.722509] ksys_unshare+0x46a/0xa10 [ 1609.722635] ? srso_return_thunk+0x5/0x5f [ 1609.722724] ? __pfx_ksys_unshare+0x10/0x10 [ 1609.722863] ? ksys_write+0x1b1/0x240 [ 1609.723076] __x64_sys_unshare+0x31/0x40 [ 1609.723209] do_syscall_64+0xbf/0x1d0 [ 1609.723318] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1609.723417] RIP: 0033:0x7f119793ab19 [ 1609.723469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1609.723549] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1609.723623] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1609.723678] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1609.723731] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1609.723782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1609.723833] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1609.724014] 07:34:18 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:34:18 executing program 1: sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_MGMT_A_DOMAIN={0x7, 0x1, 'lo\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_DOMAIN={0xa, 0x1, ',{#\'@\x00'}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @empty}]}, 0x48}, 0x1, 0x0, 0x0, 0x44800}, 0x8004) r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 1610.164852] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:34:40 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 88) 07:34:40 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:34:40 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:34:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00", 0xc}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:34:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth1_virt_wifi\x00'}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000100)=0xe7, 0x4) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendto$packet(r2, &(0x7f0000000040)="3ddb8f929d5aec688a22", 0xa, 0x0, &(0x7f00000000c0)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000240)={'syztnl2\x00', &(0x7f0000000140)={'gre0\x00', r4, 0x7800, 0x40, 0x8001, 0x30, {{0x30, 0x4, 0x1, 0x1, 0xc0, 0x65, 0x0, 0x8, 0x2f, 0x0, @remote, @loopback, {[@rr={0x7, 0xf, 0x60, [@rand_addr=0x64010101, @rand_addr=0x64010101, @rand_addr=0x64010102]}, @noop, @lsrr={0x83, 0x1f, 0x81, [@broadcast, @rand_addr=0x64010102, @loopback, @private=0xa010102, @multicast1, @broadcast, @broadcast]}, @end, @ssrr={0x89, 0x7, 0xa6, [@local]}, @cipso={0x86, 0x4e, 0x3, [{0x7, 0x8, "318703fc5332"}, {0x1, 0x5, "d91a7e"}, {0x5, 0x11, "aaea6fd7b5421b7bd90192c7c57e2c"}, {0x7, 0xa, "cec3824058426f85"}, {0x2, 0x8, "c70f51a13e56"}, {0x5, 0x2}, {0x6, 0x12, "235cd097cda1c4113cb1d7a0784b756f"}, {0x2, 0x4, 'd4'}]}, @timestamp_prespec={0x44, 0x24, 0x29, 0x3, 0x8, [{@empty, 0x2}, {@local}, {@multicast1, 0x6}, {@multicast1, 0xfffffffc}]}]}}}}}) bind$packet(r2, &(0x7f0000000000)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f00000000c0)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'ip6gre0\x00'}) 07:34:40 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 89) 07:34:40 executing program 3: openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000011c0)) 07:34:40 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xf0020000, 0x0) [ 1631.837934] loop4: detected capacity change from 0 to 40 [ 1631.865595] FAT-fs (loop4): bogus number of reserved sectors [ 1631.866782] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1631.918947] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:34:40 executing program 3: openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000011c0)) 07:34:40 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xf0ffffff, 0x0) 07:34:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'geneve1\x00'}) 07:34:41 executing program 3: openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000011c0)) 07:34:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 89) 07:34:41 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 90) 07:34:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r2, 0x5441, 0x7fff) accept$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f0000000140)=0x10) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r4, 0x1, 0x22, &(0x7f0000000180)=""/216, &(0x7f0000000280)=0xd8) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r5, 0x40045431, &(0x7f0000000040)) ioctl$TIOCEXCL(r5, 0x540c) ioctl$TIOCGPTPEER(r5, 0x5441, 0x7fff) ioctl$AUTOFS_IOC_ASKUMOUNT(r5, 0x80049370, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'geneve0\x00'}) [ 1632.619950] FAULT_INJECTION: forcing a failure. [ 1632.619950] name failslab, interval 1, probability 0, space 0, times 0 [ 1632.621868] CPU: 1 UID: 0 PID: 10428 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1632.621959] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1632.622001] Call Trace: [ 1632.622020] [ 1632.622045] dump_stack_lvl+0xfa/0x120 [ 1632.622137] should_fail_ex+0x4d7/0x5e0 [ 1632.622252] ? alloc_vfsmnt+0x23/0x730 [ 1632.622327] should_failslab+0xc2/0x120 [ 1632.622457] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1632.622570] ? srso_return_thunk+0x5/0x5f [ 1632.622652] ? lock_release+0x20f/0x6f0 [ 1632.622773] alloc_vfsmnt+0x23/0x730 [ 1632.622860] clone_mnt+0x6c/0xd80 [ 1632.622945] ? srso_return_thunk+0x5/0x5f [ 1632.623026] ? srso_return_thunk+0x5/0x5f [ 1632.623118] copy_tree+0x3ba/0x960 [ 1632.623265] copy_mnt_ns+0x1ae/0xab0 [ 1632.623383] ? srso_return_thunk+0x5/0x5f [ 1632.623460] ? srso_return_thunk+0x5/0x5f [ 1632.623571] create_new_namespaces+0xd6/0xaf0 [ 1632.623669] ? srso_return_thunk+0x5/0x5f [ 1632.623743] ? security_capable+0x2f/0x90 [ 1632.623852] unshare_nsproxy_namespaces+0xc0/0x200 [ 1632.623965] ksys_unshare+0x46a/0xa10 [ 1632.624088] ? srso_return_thunk+0x5/0x5f [ 1632.624169] ? __pfx_ksys_unshare+0x10/0x10 [ 1632.624298] ? ksys_write+0x1b1/0x240 [ 1632.624454] __x64_sys_unshare+0x31/0x40 [ 1632.624582] do_syscall_64+0xbf/0x1d0 [ 1632.624674] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1632.624770] RIP: 0033:0x7f4b4b4c4b19 [ 1632.624822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1632.624899] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1632.624970] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1632.625025] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1632.625075] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1632.625126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1632.625189] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1632.625299] 07:34:41 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xf9000000, 0x0) 07:35:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) mkdirat(r0, &(0x7f0000000380)='./file1\x00', 0xb0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1, {r0}}, './file1\x00'}) openat(r2, &(0x7f0000000340)='\x00', 0x20000, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x13, r1, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r3, 0x0, &(0x7f0000000000), 0x0, 0x4) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r4, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r5, 0x1, 0x49, &(0x7f0000000080)={0x77359400}, 0x10) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) sendfile(r6, r6, 0x0, 0x100000) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x501000, 0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000540)=@IORING_OP_SENDMSG={0x9, 0x1, 0x0, r7, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=@rc={0x1f, @any, 0x1}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)="b58fee44f1f35f37fcab052c0fd90abe12a44330a094250439a02d0d9d35f771573e258baa6d903074007973dd4c613b4761fc81ecfe38a59088083233e92035655d56d4bc55248245ec801aaa45948ad347d27089e1bd339227c67ac0188a91c01cdab2c6719cfbd4c14f59f7df70c04e4ab208c7c118aa1de745fa4975616641eaf0afcd4837dcc25bdf6aecf75e97f9f8431a3780e5f6846e285567256e178eefb98cf34d1400a98a46d9370a086157dadb13d00f4c2bb410d4d0a4bc1abafb6cab752b7946", 0xc7}, {&(0x7f00000000c0)="058697723450ff943bbb147ba2fe39e8ebe4a0fe4ff726b2ce4472a7", 0x1c}], 0x1a1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1f8}, 0x0, 0x4000, 0x0, {0x0, r8}}, 0x3ff) 07:35:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fff) pread64(r1, &(0x7f00000000c0)=""/106, 0x6a, 0x5) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f0000000040), &(0x7f0000000080)=0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000140)) 07:35:01 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(r0, 0x125e, 0x0) 07:35:01 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 90) 07:35:01 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 91) 07:35:01 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x0, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:35:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:35:01 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xfcfdffff, 0x0) [ 1652.598047] loop4: detected capacity change from 0 to 40 [ 1652.609091] FAT-fs (loop4): invalid media value (0x00) [ 1652.609657] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1652.724120] FAULT_INJECTION: forcing a failure. [ 1652.724120] name failslab, interval 1, probability 0, space 0, times 0 [ 1652.725750] CPU: 1 UID: 0 PID: 10455 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1652.725799] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1652.725823] Call Trace: [ 1652.725846] [ 1652.725860] dump_stack_lvl+0xfa/0x120 [ 1652.725910] should_fail_ex+0x4d7/0x5e0 [ 1652.725975] ? alloc_vfsmnt+0x23/0x730 [ 1652.726016] should_failslab+0xc2/0x120 [ 1652.726087] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1652.726153] ? srso_return_thunk+0x5/0x5f [ 1652.726194] ? lock_release+0x20f/0x6f0 [ 1652.726259] alloc_vfsmnt+0x23/0x730 [ 1652.726306] clone_mnt+0x6c/0xd80 [ 1652.726352] ? srso_return_thunk+0x5/0x5f [ 1652.726396] ? srso_return_thunk+0x5/0x5f [ 1652.726445] copy_tree+0x3ba/0x960 [ 1652.726525] copy_mnt_ns+0x1ae/0xab0 [ 1652.726588] ? srso_return_thunk+0x5/0x5f [ 1652.726630] ? srso_return_thunk+0x5/0x5f [ 1652.726689] create_new_namespaces+0xd6/0xaf0 [ 1652.726742] ? srso_return_thunk+0x5/0x5f [ 1652.726782] ? security_capable+0x2f/0x90 [ 1652.726842] unshare_nsproxy_namespaces+0xc0/0x200 [ 1652.726903] ksys_unshare+0x46a/0xa10 [ 1652.726970] ? srso_return_thunk+0x5/0x5f [ 1652.727013] ? __pfx_ksys_unshare+0x10/0x10 [ 1652.727083] ? ksys_write+0x1b1/0x240 [ 1652.727167] __x64_sys_unshare+0x31/0x40 [ 1652.727235] do_syscall_64+0xbf/0x1d0 [ 1652.727286] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1652.727339] RIP: 0033:0x7f119793ab19 [ 1652.727368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1652.727411] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1652.727450] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1652.727479] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1652.727507] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1652.727539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1652.727566] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1652.727625] 07:35:01 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xfcffffff, 0x0) 07:35:01 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(r0, 0x125e, 0x0) [ 1652.845581] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:35:01 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 91) 07:35:01 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 92) 07:35:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @random="7bfa1c855c8c"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:35:02 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xfdfdffff, 0x0) 07:35:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fff) pread64(r1, &(0x7f00000000c0)=""/106, 0x6a, 0x5) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f0000000040), &(0x7f0000000080)=0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000140)) 07:35:02 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 92) [ 1653.532518] lo: left promiscuous mode [ 1653.532967] lo: left allmulticast mode [ 1653.544082] FAULT_INJECTION: forcing a failure. [ 1653.544082] name failslab, interval 1, probability 0, space 0, times 0 [ 1653.545166] CPU: 1 UID: 0 PID: 10477 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1653.545217] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1653.545240] Call Trace: [ 1653.545251] [ 1653.545266] dump_stack_lvl+0xfa/0x120 [ 1653.545314] should_fail_ex+0x4d7/0x5e0 [ 1653.545380] should_failslab+0xc2/0x120 [ 1653.545452] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1653.545516] ? __pfx_lock_release+0x10/0x10 [ 1653.545577] ? kstrdup_const+0x57/0x80 [ 1653.545628] kstrdup+0x3e/0xc0 [ 1653.545667] kstrdup_const+0x57/0x80 [ 1653.545707] alloc_vfsmnt+0xe2/0x730 [ 1653.545755] clone_mnt+0x6c/0xd80 [ 1653.545801] ? srso_return_thunk+0x5/0x5f [ 1653.545854] ? srso_return_thunk+0x5/0x5f [ 1653.545914] copy_tree+0x3ba/0x960 [ 1653.545994] copy_mnt_ns+0x1ae/0xab0 [ 1653.546056] ? srso_return_thunk+0x5/0x5f [ 1653.546099] ? srso_return_thunk+0x5/0x5f [ 1653.546162] create_new_namespaces+0xd6/0xaf0 [ 1653.546216] ? srso_return_thunk+0x5/0x5f [ 1653.546256] ? security_capable+0x2f/0x90 [ 1653.546315] unshare_nsproxy_namespaces+0xc0/0x200 [ 1653.546377] ksys_unshare+0x46a/0xa10 [ 1653.546443] ? srso_return_thunk+0x5/0x5f [ 1653.546486] ? __pfx_ksys_unshare+0x10/0x10 [ 1653.546556] ? ksys_write+0x1b1/0x240 [ 1653.546641] __x64_sys_unshare+0x31/0x40 [ 1653.546708] do_syscall_64+0xbf/0x1d0 [ 1653.546759] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1653.546812] RIP: 0033:0x7f4b4b4c4b19 [ 1653.546845] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1653.546888] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1653.546928] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1653.546957] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1653.546984] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1653.547012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1653.547039] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1653.547098] 07:35:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:35:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x0, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:35:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fff) pread64(r1, &(0x7f00000000c0)=""/106, 0x6a, 0x5) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f0000000040), &(0x7f0000000080)=0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000140)) 07:35:02 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(r0, 0x125e, 0x0) [ 1653.755366] loop4: detected capacity change from 0 to 40 [ 1653.768412] FAT-fs (loop4): invalid media value (0x00) [ 1653.768889] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1653.775676] FAULT_INJECTION: forcing a failure. [ 1653.775676] name failslab, interval 1, probability 0, space 0, times 0 [ 1653.776696] CPU: 1 UID: 0 PID: 10485 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1653.776744] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1653.776769] Call Trace: [ 1653.776779] [ 1653.776793] dump_stack_lvl+0xfa/0x120 [ 1653.776841] should_fail_ex+0x4d7/0x5e0 [ 1653.776906] should_failslab+0xc2/0x120 [ 1653.776977] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1653.777041] ? __pfx_lock_release+0x10/0x10 [ 1653.777102] ? kstrdup_const+0x57/0x80 [ 1653.777157] kstrdup+0x3e/0xc0 [ 1653.777196] kstrdup_const+0x57/0x80 [ 1653.777236] alloc_vfsmnt+0xe2/0x730 [ 1653.777283] clone_mnt+0x6c/0xd80 [ 1653.777330] ? srso_return_thunk+0x5/0x5f [ 1653.777375] ? srso_return_thunk+0x5/0x5f [ 1653.777423] copy_tree+0x3ba/0x960 [ 1653.777503] copy_mnt_ns+0x1ae/0xab0 [ 1653.777566] ? srso_return_thunk+0x5/0x5f [ 1653.777607] ? srso_return_thunk+0x5/0x5f [ 1653.777666] create_new_namespaces+0xd6/0xaf0 [ 1653.777720] ? srso_return_thunk+0x5/0x5f [ 1653.777760] ? security_capable+0x2f/0x90 [ 1653.777819] unshare_nsproxy_namespaces+0xc0/0x200 [ 1653.777890] ksys_unshare+0x46a/0xa10 [ 1653.777956] ? srso_return_thunk+0x5/0x5f [ 1653.778000] ? __pfx_ksys_unshare+0x10/0x10 [ 1653.778069] ? ksys_write+0x1b1/0x240 [ 1653.778154] __x64_sys_unshare+0x31/0x40 [ 1653.778222] do_syscall_64+0xbf/0x1d0 [ 1653.778272] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1653.778325] RIP: 0033:0x7f119793ab19 [ 1653.778353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1653.778395] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1653.778434] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1653.778463] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1653.778491] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1653.778518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1653.778545] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1653.778603] 07:35:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x9) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) dup(0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'icmp\x00'}, &(0x7f0000000080)=0x1e) r3 = pidfd_getfd(r1, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x7fff) ioctl$AUTOFS_DEV_IOCTL_FAIL(r3, 0xc0189377, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0x1}}, './file1\x00'}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0x4004662b, &(0x7f0000000000)) bind$packet(0xffffffffffffffff, &(0x7f0000000000), 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x1, 0x93, 0x81, 0x63, 0x0, 0x5, 0x8, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4808a, 0x2, 0xa6f3, 0x1, 0x80000000, 0x1, 0x7, 0x0, 0x1, 0x0, 0x200}, 0xffffffffffffffff, 0xd, r3, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e24, @empty}, 0x10) [ 1653.907625] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:35:02 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xfeffffff, 0x0) 07:35:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fff) pread64(r1, &(0x7f00000000c0)=""/106, 0x6a, 0x5) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f0000000040), &(0x7f0000000080)=0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000140)) 07:35:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x0, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:35:21 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 93) 07:35:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:35:21 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7fff) pread64(r0, &(0x7f00000000c0)=""/106, 0x6a, 0x5) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x3f, &(0x7f0000000040), &(0x7f0000000080)=0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000140)) 07:35:21 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fff) pread64(r1, &(0x7f00000000c0)=""/106, 0x6a, 0x5) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f0000000040), &(0x7f0000000080)=0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000140)) 07:35:21 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xff0f0000, 0x0) 07:35:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'ip6_vti0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="9dfd0000000000000000000000000000acba1838dea7ee5afe9ae0e5dc46553b513ce74b394fe2ed4172f4a9e93968e8ceeab6395d4de92b1ce6a271351739f3128dba93ba0bc029a33276eb7d648b53598cc5883b0f432d04cab9df1580977d33335b43df10f42e56846b87c6987bfc7fe30a1c531365939e8a61ae89ae833aa342b918c1a0bc8773d63ec33d549bdde8d6513669ff00def3fca7dd470e515e6cbb7e5d0638644c854d3c9f67d5653c64d98e92ce25b321f74ced7d104b"]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000180)={'gretap0\x00', 0x0, 0x10, 0x7, 0x90, 0x7, {{0x38, 0x4, 0x2, 0x0, 0xe0, 0x66, 0x0, 0x1, 0x29, 0x0, @multicast2, @broadcast, {[@timestamp_addr={0x44, 0x2c, 0xf7, 0x1, 0x4, [{@remote, 0x2}, {@local, 0x400}, {@multicast1, 0x7}, {@remote, 0xa1e7}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}]}, @lsrr={0x83, 0x13, 0x4, [@dev={0xac, 0x14, 0x14, 0x44}, @empty, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @timestamp={0x44, 0x1c, 0x1a, 0x0, 0xe, [0xfffffff9, 0x6, 0x40, 0x6, 0x4, 0x4]}, @end, @timestamp={0x44, 0x2c, 0x8e, 0x0, 0xf, [0x1, 0x7, 0x0, 0x40, 0x9, 0x3, 0x7, 0x1, 0x4, 0x2]}, @ssrr={0x89, 0xb, 0x14, [@multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @lsrr={0x83, 0x23, 0x47, [@multicast1, @loopback, @empty, @remote, @multicast1, @private=0xa010102, @rand_addr=0x64010100, @local]}, @timestamp={0x44, 0x14, 0xb8, 0x0, 0x4, [0xffffffff, 0x0, 0x0, 0x20]}]}}}}}) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x20, 0xbc881) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000100)={'netpci0\x00'}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000100)=0xe7, 0x4) r6 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendto$packet(0xffffffffffffffff, &(0x7f0000000040)="3ddb8f929d5aec688a22", 0xa, 0x0, &(0x7f00000000c0)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000440)={0x0, @phonet={0x23, 0xff, 0xfd, 0x81}, @phonet={0x23, 0x0, 0xde}, @xdp={0x2c, 0x4, 0x0, 0x14}, 0x324, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, 0x79}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r2, &(0x7f0000000600)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0xa8, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x16}}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r3}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}]}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x80}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r7}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}]}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @private=0xa010102}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) close(r5) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'wg2\x00'}) 07:35:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 93) [ 1672.929308] loop4: detected capacity change from 0 to 40 [ 1672.951351] FAT-fs (loop4): invalid media value (0x00) [ 1672.951845] FAT-fs (loop4): Can't find a valid FAT filesystem 07:35:21 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7fff) pread64(r0, &(0x7f00000000c0)=""/106, 0x6a, 0x5) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x3f, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000140)) 07:35:21 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 94) [ 1673.055967] FAULT_INJECTION: forcing a failure. [ 1673.055967] name failslab, interval 1, probability 0, space 0, times 0 [ 1673.058041] CPU: 0 UID: 0 PID: 10523 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1673.058144] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1673.058186] Call Trace: [ 1673.058205] [ 1673.058236] dump_stack_lvl+0xfa/0x120 [ 1673.058331] should_fail_ex+0x4d7/0x5e0 [ 1673.058471] should_failslab+0xc2/0x120 [ 1673.058623] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1673.058740] ? __pfx_lock_release+0x10/0x10 [ 1673.058863] ? kstrdup_const+0x57/0x80 [ 1673.058986] kstrdup+0x3e/0xc0 [ 1673.059068] kstrdup_const+0x57/0x80 [ 1673.059148] alloc_vfsmnt+0xe2/0x730 [ 1673.059253] clone_mnt+0x6c/0xd80 [ 1673.059338] ? srso_return_thunk+0x5/0x5f [ 1673.059426] ? srso_return_thunk+0x5/0x5f [ 1673.059538] copy_tree+0x3ba/0x960 [ 1673.059735] copy_mnt_ns+0x1ae/0xab0 [ 1673.059852] ? srso_return_thunk+0x5/0x5f [ 1673.059934] ? srso_return_thunk+0x5/0x5f [ 1673.060086] create_new_namespaces+0xd6/0xaf0 [ 1673.060187] ? srso_return_thunk+0x5/0x5f [ 1673.060263] ? security_capable+0x2f/0x90 [ 1673.060401] unshare_nsproxy_namespaces+0xc0/0x200 [ 1673.060531] ksys_unshare+0x46a/0xa10 [ 1673.060652] ? srso_return_thunk+0x5/0x5f [ 1673.060740] ? __pfx_ksys_unshare+0x10/0x10 [ 1673.060876] ? ksys_write+0x1b1/0x240 [ 1673.061084] __x64_sys_unshare+0x31/0x40 [ 1673.061214] do_syscall_64+0xbf/0x1d0 [ 1673.061320] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1673.061416] RIP: 0033:0x7f119793ab19 [ 1673.061468] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1673.061544] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1673.061616] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1673.061670] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1673.061720] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1673.061770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1673.061820] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1673.061999] 07:35:21 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xfffff000, 0x0) [ 1673.301084] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:35:42 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) (fail_nth: 1) 07:35:42 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 95) 07:35:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x0, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:35:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000", 0x15}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:35:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f0000000300)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/109, 0x6d}, {&(0x7f0000000140)}, {&(0x7f0000000180)=""/189, 0xbd}], 0x3, &(0x7f0000000280)=""/125, 0x7d}, 0x40000000) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000003c0)={'syztnl2\x00', &(0x7f0000000340)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x8, 0x3, 0x22, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x7, 0x0, 0x101, 0x3ff}}) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, r2}, 0xc) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth1_to_batadv\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:35:42 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xfffffdfc, 0x0) 07:35:42 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 94) 07:35:42 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7fff) pread64(r0, &(0x7f00000000c0)=""/106, 0x6a, 0x5) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000140)) [ 1693.871588] FAULT_INJECTION: forcing a failure. [ 1693.871588] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1693.872880] CPU: 0 UID: 0 PID: 10546 Comm: syz-executor.3 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1693.872930] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1693.872953] Call Trace: [ 1693.872964] [ 1693.872978] dump_stack_lvl+0xfa/0x120 [ 1693.873026] should_fail_ex+0x4d7/0x5e0 [ 1693.873090] should_fail_alloc_page+0xe0/0x110 [ 1693.873169] prepare_alloc_pages+0x178/0x500 [ 1693.873215] ? srso_return_thunk+0x5/0x5f [ 1693.873257] ? hlock_class+0x4e/0x130 [ 1693.873295] ? srso_return_thunk+0x5/0x5f [ 1693.873344] __alloc_frozen_pages_noprof+0x180/0x1f90 [ 1693.873406] ? __pfx_mark_lock+0x10/0x10 [ 1693.873465] ? __pfx___lock_acquire+0x10/0x10 [ 1693.873528] ? srso_return_thunk+0x5/0x5f [ 1693.873569] ? hlock_class+0x4e/0x130 [ 1693.873607] ? srso_return_thunk+0x5/0x5f [ 1693.873647] ? __lock_acquire+0xc97/0x4360 [ 1693.873702] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1693.873786] ? __pfx___lock_acquire+0x10/0x10 [ 1693.873847] ? srso_return_thunk+0x5/0x5f [ 1693.873888] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1693.873946] ? srso_return_thunk+0x5/0x5f [ 1693.873987] ? policy_nodemask+0xeb/0x4e0 [ 1693.874045] alloc_pages_mpol+0xee/0x330 [ 1693.874099] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1693.874152] ? find_held_lock+0x2c/0x110 [ 1693.874193] ? srso_return_thunk+0x5/0x5f [ 1693.874233] ? get_vma_policy+0x241/0x350 [ 1693.874298] vma_alloc_folio_noprof+0xea/0x410 [ 1693.874358] ? __pfx_vma_alloc_folio_noprof+0x10/0x10 [ 1693.874420] ? srso_return_thunk+0x5/0x5f [ 1693.874460] ? ___pte_offset_map+0x176/0x370 [ 1693.874519] __handle_mm_fault+0x14ee/0x2fa0 [ 1693.874586] ? __pfx_mt_find+0x10/0x10 [ 1693.874636] ? __pfx___handle_mm_fault+0x10/0x10 [ 1693.874724] ? srso_return_thunk+0x5/0x5f [ 1693.874764] ? find_vma+0xc0/0x140 [ 1693.874816] ? __pfx_find_vma+0x10/0x10 [ 1693.874877] handle_mm_fault+0x2b4/0x6a0 [ 1693.874939] ? access_error+0x17d/0x380 [ 1693.874980] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 1693.875046] do_user_addr_fault+0x395/0xd50 [ 1693.875102] exc_page_fault+0x9c/0x1a0 [ 1693.875173] asm_exc_page_fault+0x26/0x30 [ 1693.875223] RIP: 0010:__put_user_4+0x11/0x20 [ 1693.875268] Code: 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 89 cb 48 c1 fb 3f 48 09 d9 0f 01 cb <89> 01 31 c9 0f 01 ca e9 13 b0 02 00 0f 1f 00 90 90 90 90 90 90 90 [ 1693.875321] RSP: 0018:ffff888015cdfca0 EFLAGS: 00050206 [ 1693.875353] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000200011c0 [ 1693.875380] RDX: 0000000000040000 RSI: ffffffff8236e760 RDI: ffff888040d941b8 [ 1693.875409] RBP: ffff888009f732e8 R08: 0000000000000001 R09: ffff888040d941c0 [ 1693.875437] R10: ffffffff863fc897 R11: 0000000000000001 R12: 1ffff11002b9bf99 [ 1693.875465] R13: 0000000000000000 R14: 00000000200011c0 R15: 000000000000125e [ 1693.875510] ? blkdev_common_ioctl+0x280/0x1f30 [ 1693.875559] blkdev_common_ioctl+0x28b/0x1f30 [ 1693.875603] ? srso_return_thunk+0x5/0x5f [ 1693.875646] ? __pfx_blkdev_common_ioctl+0x10/0x10 [ 1693.875690] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1693.875741] ? srso_return_thunk+0x5/0x5f [ 1693.875796] ? srso_return_thunk+0x5/0x5f [ 1693.875837] ? srso_return_thunk+0x5/0x5f [ 1693.875878] ? ioctl_has_perm.constprop.0.isra.0+0x29e/0x420 [ 1693.875940] ? __fget_files+0x1fc/0x3b0 [ 1693.876002] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1693.876068] ? __lock_acquire+0x26ae/0x4360 [ 1693.876120] ? trace_lock_acquire+0x13b/0x1b0 [ 1693.876171] ? srso_return_thunk+0x5/0x5f [ 1693.876215] ? lock_acquire+0x32/0xc0 [ 1693.876278] blkdev_ioctl+0x1d2/0x6d0 [ 1693.876317] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1693.876358] ? srso_return_thunk+0x5/0x5f [ 1693.876399] ? selinux_file_ioctl+0xb9/0x280 [ 1693.876460] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1693.876505] __x64_sys_ioctl+0x1a7/0x210 [ 1693.876561] do_syscall_64+0xbf/0x1d0 [ 1693.876611] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1693.876662] RIP: 0033:0x7f74c88efb19 [ 1693.876690] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1693.876732] RSP: 002b:00007f74c5e65188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1693.876769] RAX: ffffffffffffffda RBX: 00007f74c8a02f60 RCX: 00007f74c88efb19 [ 1693.876799] RDX: 00000000200011c0 RSI: 000000000000125e RDI: 0000000000000003 [ 1693.876826] RBP: 00007f74c5e651d0 R08: 0000000000000000 R09: 0000000000000000 [ 1693.876853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1693.876880] R13: 00007ffe547f6a3f R14: 00007f74c5e65300 R15: 0000000000022000 [ 1693.876936] [ 1693.914841] lo: entered promiscuous mode [ 1693.915288] lo: entered allmulticast mode [ 1693.942839] FAULT_INJECTION: forcing a failure. [ 1693.942839] name failslab, interval 1, probability 0, space 0, times 0 [ 1693.944379] CPU: 0 UID: 0 PID: 10555 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1693.944429] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1693.944453] Call Trace: [ 1693.944463] [ 1693.944479] dump_stack_lvl+0xfa/0x120 [ 1693.944530] should_fail_ex+0x4d7/0x5e0 [ 1693.944603] ? alloc_vfsmnt+0x23/0x730 [ 1693.944644] should_failslab+0xc2/0x120 [ 1693.944718] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1693.944781] ? srso_return_thunk+0x5/0x5f [ 1693.944822] ? lock_release+0x20f/0x6f0 [ 1693.944903] alloc_vfsmnt+0x23/0x730 [ 1693.944959] clone_mnt+0x6c/0xd80 [ 1693.945005] ? srso_return_thunk+0x5/0x5f [ 1693.945052] ? srso_return_thunk+0x5/0x5f [ 1693.945117] copy_tree+0x3ba/0x960 [ 1693.945222] copy_mnt_ns+0x1ae/0xab0 [ 1693.945286] ? srso_return_thunk+0x5/0x5f [ 1693.945330] ? srso_return_thunk+0x5/0x5f [ 1693.945411] create_new_namespaces+0xd6/0xaf0 [ 1693.945466] ? srso_return_thunk+0x5/0x5f [ 1693.945507] ? security_capable+0x2f/0x90 [ 1693.945582] unshare_nsproxy_namespaces+0xc0/0x200 [ 1693.945652] ksys_unshare+0x46a/0xa10 [ 1693.945718] ? srso_return_thunk+0x5/0x5f [ 1693.945765] ? __pfx_ksys_unshare+0x10/0x10 [ 1693.945838] ? ksys_write+0x1b1/0x240 [ 1693.945950] __x64_sys_unshare+0x31/0x40 [ 1693.946021] do_syscall_64+0xbf/0x1d0 [ 1693.946078] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1693.946130] RIP: 0033:0x7f4b4b4c4b19 [ 1693.946158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1693.946199] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1693.946238] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1693.946267] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1693.946294] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1693.946321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1693.946348] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1693.946444] [ 1693.976518] loop4: detected capacity change from 0 to 40 07:35:42 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xfffffdfd, 0x0) [ 1694.007287] FAT-fs (loop4): invalid media value (0x00) [ 1694.008394] FAT-fs (loop4): Can't find a valid FAT filesystem 07:35:42 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) (fail_nth: 2) 07:35:42 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 96) [ 1694.097511] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:35:42 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xffffff8c, 0x0) 07:35:43 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7fff) pread64(r0, &(0x7f00000000c0)=""/106, 0x6a, 0x5) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000140)) [ 1694.224750] FAULT_INJECTION: forcing a failure. [ 1694.224750] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1694.226053] CPU: 0 UID: 0 PID: 10565 Comm: syz-executor.3 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1694.226102] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1694.226130] Call Trace: [ 1694.226140] [ 1694.226155] dump_stack_lvl+0xfa/0x120 [ 1694.226203] should_fail_ex+0x4d7/0x5e0 [ 1694.226268] _copy_to_user+0x32/0xd0 [ 1694.226319] simple_read_from_buffer+0xd0/0x170 [ 1694.226378] proc_fail_nth_read+0x18a/0x280 [ 1694.226434] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1694.226489] ? srso_return_thunk+0x5/0x5f [ 1694.226530] ? security_file_permission+0x22/0x90 [ 1694.226599] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1694.226654] vfs_read+0x243/0xbd0 [ 1694.226720] ? trace_lock_acquire+0x13b/0x1b0 [ 1694.226767] ? __pfx_vfs_read+0x10/0x10 [ 1694.226833] ? lock_acquire+0x32/0xc0 [ 1694.226885] ? __fget_files+0x34/0x3b0 [ 1694.226952] ? srso_return_thunk+0x5/0x5f [ 1694.226993] ? __fget_files+0x206/0x3b0 [ 1694.227073] ksys_read+0x122/0x240 [ 1694.227135] ? __pfx_ksys_read+0x10/0x10 [ 1694.227196] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1694.227237] ? srso_return_thunk+0x5/0x5f [ 1694.227306] do_syscall_64+0xbf/0x1d0 [ 1694.227356] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1694.227409] RIP: 0033:0x7f74c88a269c [ 1694.227437] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1694.227479] RSP: 002b:00007f74c5e65170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1694.227518] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f74c88a269c [ 1694.227546] RDX: 000000000000000f RSI: 00007f74c5e651e0 RDI: 0000000000000004 [ 1694.227573] RBP: 00007f74c5e651d0 R08: 0000000000000000 R09: 0000000000000000 [ 1694.227600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1694.227627] R13: 00007ffe547f6a3f R14: 00007f74c5e65300 R15: 0000000000022000 [ 1694.227686] 07:35:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 95) 07:35:43 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xffffff9e, 0x0) [ 1694.414620] FAULT_INJECTION: forcing a failure. [ 1694.414620] name failslab, interval 1, probability 0, space 0, times 0 [ 1694.416664] CPU: 1 UID: 0 PID: 10572 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1694.416762] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1694.416808] Call Trace: [ 1694.416828] [ 1694.416856] dump_stack_lvl+0xfa/0x120 [ 1694.416946] should_fail_ex+0x4d7/0x5e0 [ 1694.417070] ? alloc_vfsmnt+0x23/0x730 [ 1694.417157] should_failslab+0xc2/0x120 [ 1694.417297] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1694.417419] ? srso_return_thunk+0x5/0x5f [ 1694.417500] ? lock_release+0x20f/0x6f0 [ 1694.417631] alloc_vfsmnt+0x23/0x730 [ 1694.417724] clone_mnt+0x6c/0xd80 [ 1694.417816] ? srso_return_thunk+0x5/0x5f [ 1694.417903] ? srso_return_thunk+0x5/0x5f [ 1694.418000] copy_tree+0x3ba/0x960 [ 1694.418159] copy_mnt_ns+0x1ae/0xab0 [ 1694.418285] ? srso_return_thunk+0x5/0x5f [ 1694.418368] ? srso_return_thunk+0x5/0x5f [ 1694.418487] create_new_namespaces+0xd6/0xaf0 [ 1694.418592] ? srso_return_thunk+0x5/0x5f [ 1694.418673] ? security_capable+0x2f/0x90 [ 1694.418789] unshare_nsproxy_namespaces+0xc0/0x200 [ 1694.418911] ksys_unshare+0x46a/0xa10 [ 1694.419043] ? srso_return_thunk+0x5/0x5f [ 1694.419130] ? __pfx_ksys_unshare+0x10/0x10 [ 1694.419268] ? ksys_write+0x1b1/0x240 [ 1694.419453] __x64_sys_unshare+0x31/0x40 [ 1694.419590] do_syscall_64+0xbf/0x1d0 [ 1694.419690] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1694.419793] RIP: 0033:0x7f119793ab19 [ 1694.419848] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1694.419932] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1694.420009] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1694.420067] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1694.420121] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1694.420175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1694.420228] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1694.420346] 07:35:43 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7fff) pread64(r0, &(0x7f00000000c0)=""/106, 0x6a, 0x5) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000140)) 07:36:01 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) 07:36:01 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xffffffa7, 0x0) 07:36:01 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 97) 07:36:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000", 0x15}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:36:01 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x0, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:36:01 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7fff) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000140)) 07:36:01 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 96) 07:36:01 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000180)={0x0, 0x5}) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@exit_looper], 0x7a, 0x0, &(0x7f00000000c0)="8b07fab14abcd32ade984a1db18b070cc98a6c4c3cb446b5fc6b825294afaf24fb8360216eea818e61b25ae08d5ab809cdbedf50f989f609904006752398e85ee971d8a90b1ad056380d7c4df04ff1145ef0a252e5f25abf11bf952f2d3bfa9ec8872a4a980988b4901adbc60f629a5b6dba5a792400c3c59358"}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'veth0_vlan\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 1712.357738] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:36:01 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xfffffff0, 0x0) [ 1712.402874] loop4: detected capacity change from 0 to 40 [ 1712.421368] FAT-fs (loop4): invalid media value (0x00) [ 1712.422352] FAT-fs (loop4): Can't find a valid FAT filesystem 07:36:01 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xfffffffc, 0x0) [ 1712.491913] FAULT_INJECTION: forcing a failure. [ 1712.491913] name failslab, interval 1, probability 0, space 0, times 0 [ 1712.493994] CPU: 1 UID: 0 PID: 10600 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1712.494098] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1712.494152] Call Trace: [ 1712.494174] [ 1712.494204] dump_stack_lvl+0xfa/0x120 [ 1712.494300] should_fail_ex+0x4d7/0x5e0 [ 1712.494434] should_failslab+0xc2/0x120 [ 1712.494583] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1712.494716] ? __pfx_lock_release+0x10/0x10 [ 1712.494841] ? kstrdup_const+0x57/0x80 [ 1712.494947] kstrdup+0x3e/0xc0 [ 1712.495029] kstrdup_const+0x57/0x80 [ 1712.495113] alloc_vfsmnt+0xe2/0x730 [ 1712.495213] clone_mnt+0x6c/0xd80 [ 1712.495312] ? srso_return_thunk+0x5/0x5f [ 1712.495404] ? srso_return_thunk+0x5/0x5f [ 1712.495508] copy_tree+0x3ba/0x960 [ 1712.495676] copy_mnt_ns+0x1ae/0xab0 [ 1712.495809] ? srso_return_thunk+0x5/0x5f [ 1712.495899] ? srso_return_thunk+0x5/0x5f [ 1712.496036] create_new_namespaces+0xd6/0xaf0 [ 1712.496147] ? srso_return_thunk+0x5/0x5f [ 1712.496234] ? security_capable+0x2f/0x90 [ 1712.496356] unshare_nsproxy_namespaces+0xc0/0x200 [ 1712.496487] ksys_unshare+0x46a/0xa10 [ 1712.496626] ? srso_return_thunk+0x5/0x5f [ 1712.496717] ? __pfx_ksys_unshare+0x10/0x10 [ 1712.496866] ? ksys_write+0x1b1/0x240 [ 1712.497043] __x64_sys_unshare+0x31/0x40 [ 1712.497188] do_syscall_64+0xbf/0x1d0 [ 1712.497293] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1712.497403] RIP: 0033:0x7f4b4b4c4b19 [ 1712.497463] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1712.497550] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1712.497632] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1712.497693] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1712.497750] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1712.497808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1712.497864] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1712.497987] 07:36:01 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 97) 07:36:01 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000140)) [ 1712.740261] FAULT_INJECTION: forcing a failure. [ 1712.740261] name failslab, interval 1, probability 0, space 0, times 0 [ 1712.741550] CPU: 0 UID: 0 PID: 10608 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1712.741599] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1712.741623] Call Trace: [ 1712.741633] [ 1712.741649] dump_stack_lvl+0xfa/0x120 [ 1712.741704] should_fail_ex+0x4d7/0x5e0 [ 1712.741783] should_failslab+0xc2/0x120 [ 1712.741858] __kmalloc_node_track_caller_noprof+0xb9/0x490 [ 1712.741923] ? __pfx_lock_release+0x10/0x10 [ 1712.741990] ? kstrdup_const+0x57/0x80 [ 1712.742057] kstrdup+0x3e/0xc0 [ 1712.742106] kstrdup_const+0x57/0x80 [ 1712.742150] alloc_vfsmnt+0xe2/0x730 [ 1712.742207] clone_mnt+0x6c/0xd80 [ 1712.742254] ? srso_return_thunk+0x5/0x5f [ 1712.742304] ? srso_return_thunk+0x5/0x5f [ 1712.742363] copy_tree+0x3ba/0x960 [ 1712.742470] copy_mnt_ns+0x1ae/0xab0 [ 1712.742533] ? srso_return_thunk+0x5/0x5f [ 1712.742576] ? srso_return_thunk+0x5/0x5f [ 1712.742659] create_new_namespaces+0xd6/0xaf0 [ 1712.742714] ? srso_return_thunk+0x5/0x5f [ 1712.742754] ? security_capable+0x2f/0x90 [ 1712.742830] unshare_nsproxy_namespaces+0xc0/0x200 [ 1712.742900] ksys_unshare+0x46a/0xa10 [ 1712.742966] ? srso_return_thunk+0x5/0x5f [ 1712.743014] ? __pfx_ksys_unshare+0x10/0x10 [ 1712.743087] ? ksys_write+0x1b1/0x240 [ 1712.743199] __x64_sys_unshare+0x31/0x40 [ 1712.743269] do_syscall_64+0xbf/0x1d0 [ 1712.743327] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1712.743380] RIP: 0033:0x7f119793ab19 [ 1712.743409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1712.743452] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1712.743492] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1712.743521] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1712.743548] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1712.743575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1712.743603] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1712.743700] 07:36:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fff) finit_module(r1, &(0x7f0000000040)='\x00', 0x2) 07:36:01 executing program 3: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, &(0x7f0000000040)) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f00000011c0)) 07:36:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000", 0x15}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) [ 1712.942783] loop4: detected capacity change from 0 to 40 [ 1712.948492] FAT-fs (loop4): invalid media value (0x00) [ 1712.948968] FAT-fs (loop4): Can't find a valid FAT filesystem 07:36:20 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xfffffffe, 0x0) 07:36:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0xe7, 0x4) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000040)="3ddb8f929d5aec688a22", 0xa, 0x0, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, 0x0, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x400c0}, 0x80) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x1, 0x4) 07:36:20 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x0, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:36:20 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 98) 07:36:20 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 98) 07:36:20 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) write$tcp_mem(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x20, 0x5, 0x20, 0x1}, 0x48) 07:36:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f8", 0x16}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:36:20 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000140)) 07:36:20 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000140)) [ 1731.479553] loop4: detected capacity change from 0 to 40 07:36:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x10) [ 1731.529295] FAT-fs (loop4): bogus number of FAT sectors [ 1731.530376] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1731.546857] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:36:20 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x200000000, 0x0) 07:36:20 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) r1 = dup2(r0, r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000140)=""/6, 0x6}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRESDEC=0x0, @ANYRES32, @ANYRES32, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="7504ebcdbbfc609b7a78ff1d54aa4f81d5213398de5b8b45819f0b2e027a00fd9977a341b63d52186499d56600a5fe4811475ac5b79ac3463ed8d1043cd1e5909e7ae781ff8f772c5742c0faa6e3a4513c2df096727b68ccf8c668560a71d4d9900e1e9ca3464bd71481d54fd9338c7397b5ecc218c0a26accc8be57fd9048015195bbcd4f94d1189daa1b07ea740e8e2060663ea9691e97dcc9e4f62a410020fe081e292839eef921bbcc74d175", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x170}, 0x2) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x1) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r4, r3, 0x2) clone3(&(0x7f0000000840)={0x20310000, &(0x7f0000000280), &(0x7f00000002c0)=0x0, &(0x7f0000000300), {0x39}, &(0x7f00000003c0)=""/213, 0xd5, &(0x7f0000000780)=""/165, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x5, {r0}}, 0x58) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x5, 0x7, 0xa5, 0x0, 0x2, 0x4, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f00000001c0), 0xd}, 0x0, 0x5d55, 0x4, 0x9, 0x3, 0x10, 0xffe1, 0x0, 0x4, 0x0, 0x5}, r5, 0x8, r4, 0x8) close_range(r2, r1, 0x2) 07:36:20 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000140)) 07:36:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x200, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000000) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:36:20 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000140)) 07:36:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'veth0_macvtap\x00'}) 07:36:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) socket$inet_udp(0x2, 0x2, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x800) sendmsg$inet(r2, &(0x7f0000001240)={&(0x7f0000000100)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x30}}, 0x10, &(0x7f0000001140)=[{&(0x7f0000000140)="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", 0x1000}], 0x1, &(0x7f0000001180)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x40}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @dev={0xac, 0x14, 0x14, 0x10}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0xb0}, 0x800) copy_file_range(r0, &(0x7f0000000040)=0x10001, r1, 0x0, 0x80000001, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:36:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f8", 0x16}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:36:40 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 99) 07:36:40 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 99) 07:36:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000140)) 07:36:40 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) dup2(r0, r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fff) pread64(r1, &(0x7f0000000200)=""/79, 0x4f, 0x8000) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x81900) ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000100)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000040)) r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = dup2(r3, r5) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r6, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r4, {r5}}, './file0\x00'}) r8 = getpid() pidfd_open(r8, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x3, 0x0, 0x0, 0x7ff}, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) fcntl$setown(0xffffffffffffffff, 0x8, r8) ioctl$IOC_PR_PREEMPT_ABORT(r7, 0x401870cc, &(0x7f00000000c0)={0x4, 0x9, 0x7f, 0x4}) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) 07:36:40 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:36:40 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x80000000000, 0x0) [ 1751.468425] loop4: detected capacity change from 0 to 40 [ 1751.496654] FAT-fs (loop4): bogus number of FAT sectors [ 1751.497756] FAT-fs (loop4): Can't find a valid FAT filesystem 07:36:40 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 100) [ 1751.605476] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:36:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000140)) 07:36:40 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) (fail_nth: 100) 07:36:40 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x3000000000000, 0x0) 07:36:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gre0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:36:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000140)) [ 1752.048227] FAULT_INJECTION: forcing a failure. [ 1752.048227] name failslab, interval 1, probability 0, space 0, times 0 [ 1752.049920] CPU: 1 UID: 0 PID: 10699 Comm: syz-executor.7 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1752.049994] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1752.050029] Call Trace: [ 1752.050044] [ 1752.050066] dump_stack_lvl+0xfa/0x120 [ 1752.050141] should_fail_ex+0x4d7/0x5e0 [ 1752.050237] ? alloc_vfsmnt+0x23/0x730 [ 1752.050301] should_failslab+0xc2/0x120 [ 1752.050406] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1752.050497] ? srso_return_thunk+0x5/0x5f [ 1752.050559] ? lock_release+0x20f/0x6f0 [ 1752.050657] alloc_vfsmnt+0x23/0x730 [ 1752.050727] clone_mnt+0x6c/0xd80 [ 1752.050796] ? srso_return_thunk+0x5/0x5f [ 1752.050860] ? srso_return_thunk+0x5/0x5f [ 1752.050933] copy_tree+0x3ba/0x960 [ 1752.051052] copy_mnt_ns+0x1ae/0xab0 [ 1752.051146] ? srso_return_thunk+0x5/0x5f [ 1752.051210] ? srso_return_thunk+0x5/0x5f [ 1752.051303] create_new_namespaces+0xd6/0xaf0 [ 1752.051382] ? srso_return_thunk+0x5/0x5f [ 1752.051441] ? security_capable+0x2f/0x90 [ 1752.051529] unshare_nsproxy_namespaces+0xc0/0x200 [ 1752.051620] ksys_unshare+0x46a/0xa10 [ 1752.051726] ? __pfx_ksys_unshare+0x10/0x10 [ 1752.051825] ? xfd_validate_state+0x51/0x180 [ 1752.051938] ? srso_return_thunk+0x5/0x5f [ 1752.051998] ? trace_x86_fpu_regs_activated+0x130/0x190 [ 1752.052104] __x64_sys_unshare+0x31/0x40 [ 1752.052206] do_syscall_64+0xbf/0x1d0 [ 1752.052280] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1752.052358] RIP: 0033:0x7f4b4b4c4b19 [ 1752.052400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1752.052463] RSP: 002b:00007f4b48a3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1752.052521] RAX: ffffffffffffffda RBX: 00007f4b4b5d7f60 RCX: 00007f4b4b4c4b19 [ 1752.052564] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1752.052604] RBP: 00007f4b48a3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1752.052644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1752.052684] R13: 00007fffae08b18f R14: 00007f4b48a3a300 R15: 0000000000022000 [ 1752.052772] [ 1752.113995] FAULT_INJECTION: forcing a failure. [ 1752.113995] name failslab, interval 1, probability 0, space 0, times 0 [ 1752.115585] CPU: 1 UID: 0 PID: 10700 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1752.115657] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1752.115690] Call Trace: [ 1752.115704] [ 1752.115724] dump_stack_lvl+0xfa/0x120 [ 1752.115790] should_fail_ex+0x4d7/0x5e0 [ 1752.115879] ? alloc_vfsmnt+0x23/0x730 [ 1752.115937] should_failslab+0xc2/0x120 [ 1752.116037] kmem_cache_alloc_noprof+0x60/0x3d0 [ 1752.116130] ? srso_return_thunk+0x5/0x5f [ 1752.116189] ? lock_release+0x20f/0x6f0 [ 1752.116283] alloc_vfsmnt+0x23/0x730 [ 1752.116349] clone_mnt+0x6c/0xd80 [ 1752.116415] ? srso_return_thunk+0x5/0x5f [ 1752.116477] ? srso_return_thunk+0x5/0x5f [ 1752.116547] copy_tree+0x3ba/0x960 [ 1752.116660] copy_mnt_ns+0x1ae/0xab0 [ 1752.116750] ? srso_return_thunk+0x5/0x5f [ 1752.116810] ? srso_return_thunk+0x5/0x5f [ 1752.116894] create_new_namespaces+0xd6/0xaf0 [ 1752.116970] ? srso_return_thunk+0x5/0x5f [ 1752.117027] ? security_capable+0x2f/0x90 [ 1752.117110] unshare_nsproxy_namespaces+0xc0/0x200 [ 1752.117198] ksys_unshare+0x46a/0xa10 [ 1752.117292] ? srso_return_thunk+0x5/0x5f [ 1752.117371] ? __pfx_ksys_unshare+0x10/0x10 [ 1752.117469] ? ksys_write+0x1b1/0x240 [ 1752.117589] __x64_sys_unshare+0x31/0x40 [ 1752.117691] do_syscall_64+0xbf/0x1d0 [ 1752.117763] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1752.117838] RIP: 0033:0x7f119793ab19 [ 1752.117878] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1752.117938] RSP: 002b:00007f1194eb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1752.117994] RAX: ffffffffffffffda RBX: 00007f1197a4df60 RCX: 00007f119793ab19 [ 1752.118036] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028020080 [ 1752.118075] RBP: 00007f1194eb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1752.118113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1752.118151] R13: 00007fff7720d27f R14: 00007f1194eb0300 R15: 0000000000022000 [ 1752.118236] 07:36:40 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x145803, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x9, 0xff, 0x80000001}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) r2 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000040)) dup3(r1, r2, 0x80000) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) 07:36:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:37:01 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:37:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x53, &(0x7f0000000040)={0x6, 0x7, 'syz1\x00'}, &(0x7f0000000080)=0x28) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:37:01 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/144, 0x90}, {&(0x7f00000000c0)=""/68, 0x44}, {&(0x7f0000000140)=""/68, 0x44}, {&(0x7f0000000200)=""/101, 0x65}, {&(0x7f0000000280)}, {&(0x7f00000002c0)=""/145, 0x91}], 0x6, 0x7, 0xf1) 07:37:01 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x8000000000000, 0x0) 07:37:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000140)) 07:37:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f8", 0x16}, {0x0, 0x0, 0x2800}], 0x10, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:37:01 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:37:01 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x4000500) unshare(0x28020080) 07:37:02 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000140)) [ 1773.319487] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1773.323782] loop4: detected capacity change from 0 to 40 [ 1773.341356] FAT-fs (loop4): bogus number of FAT sectors [ 1773.342434] FAT-fs (loop4): Can't find a valid FAT filesystem 07:37:02 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x44c942, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x959}}, './file0\x00'}) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) close(r2) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000040)={0xbd46, 0xab}) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) r3 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x1, 0xff, 0x3f, 0x8, 0x0, 0x7f, 0x7482, 0xe, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x66, 0x0, @perf_config_ext={0x1, 0x9e15}, 0x10000, 0x3ff, 0x80, 0x2, 0x8, 0x1000, 0x3, 0x0, 0x4, 0x0, 0x6cc4}, r3, 0xf, 0xffffffffffffffff, 0x8) 07:37:02 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x10000000000000, 0x0) 07:37:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:37:02 executing program 7: setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000100)={0x0, 0xfb, 0x6d, 0x1, 0x4, "7d5511df4d744099f9d9be293107a7ba", "7ad1a23bef56ac0a1578b87833f405a69f84939ed5c60e086703b5cec135888826ef4b4eecc4aa7a2050e7d45314feb8d23b2d2a5b1b6cd17df549c7a56044087ddce6d814360a03f391ab3951968f83106a925a77ac2c02"}, 0x6d, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:37:02 executing program 3: request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='%:-\\\x00', 0xffffffffffffffff) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) 07:37:02 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000140)) 07:37:21 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000140)) 07:37:21 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x20000000000000, 0x0) 07:37:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:37:21 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) unshare(0x62000000) unshare(0x40000) unshare(0x20020400) 07:37:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x83, 0x0, 0x3f, 0x0, 0x0, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x2, @perf_bp={0x0, 0x1b}, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x9) unshare(0x20000200) unshare(0x28020080) unshare(0x20400) 07:37:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:37:21 executing program 3: sendmsg$NL80211_CMD_EXTERNAL_AUTH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x84, 0x0, 0x300, 0x70bd28, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x800, 0xa}}}}, [@NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0xe}, @NL80211_ATTR_SSID={0xb, 0x34, @random="ada02e4d35f4cb"}, @NL80211_ATTR_PMKID={0x14, 0x55, "84b01fca59b07bdc41cbec697c4e7e46"}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}, @NL80211_ATTR_PMKID={0x14, 0x55, "f613a286f69220d30efc14275907c990"}, @NL80211_ATTR_PMKID={0x14, 0x55, "a6b2a9c061e6fc6daecceb4ce95945a4"}]}, 0x84}, 0x1, 0x0, 0x0, 0x40}, 0x40000000) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x141802, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000000)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) write(r0, &(0x7f0000000200)="652ed7fe2e6ed56cabafaab6fb6ef6fabeb34df3a07bc70f044485c66a85982a06175fb1c3db3e44b4702f0ddeb6926e4d6578732a39c22968197ab9092825e4341a4e9374ffc7ffa8907b69ea30e7b95cfc00ed92cc47708bec28d4a11554fe7c80f1755c4ca76f5af520c4b5efb3349bb68a0c127c1d16c365b7bf3b4fc63639bd5cb08e4fb18e50c076d3283d825861ae02c1b6678f4a66b1af6099e3801c1a72ba683af6a832c9c63c086a5b4ecdc17cf6021ca575fc742258e3736a962a5d50bb214200f572058cfc024a30fe89a5faefc56beefdef8a30b9b10d4f3e78", 0xe0) 07:37:21 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fff) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x20000) 07:37:22 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x40030000000000, 0x0) [ 1793.213946] loop4: detected capacity change from 0 to 40 [ 1793.248674] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1793.249485] blk_print_req_error: 118 callbacks suppressed [ 1793.249514] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 07:37:22 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:37:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x4e22, @rand_addr=0x64010102}}, 0x0, 0x0, 0x5, 0x0, "51a1ce2057e54e66a28279f4ce8dab4cb021d90e02f1ae81e9c6c329bbe6c8f2de145b8414d6a361e41b3479137c9a2d976428220016cebbc50cfac2f62a39f306334e9132a38ed6f87508f424c5f6af"}, 0xd8) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x65) r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, &(0x7f00000000c0)=0x6e) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000100)) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000002c0)=""/247, &(0x7f0000000040)=0xf7) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00'}) [ 1793.333951] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1793.374825] syz-executor.4: attempt to access beyond end of device [ 1793.374825] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 07:37:22 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x490802, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) 07:37:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, 0x0) 07:37:22 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0xf0ffffffffffff, 0x0) 07:37:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:37:22 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x100000000000000, 0x0) [ 1793.927345] loop4: detected capacity change from 0 to 40 07:37:42 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) chdir(&(0x7f0000000100)='./file0\x00') unshare(0x28020080) 07:37:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7fff) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000000)=0x4) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105002, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f00000011c0)) 07:37:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) 07:37:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) 07:37:42 executing program 7: sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB='^\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="02002abd7000fedbdf2500000000080008000100000008000700", @ANYRES32, @ANYBLOB="080009000200000008000500ac1414170800080000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x20044800}, 0x8000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:37:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, 0x0) 07:37:42 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x200000000000000, 0x0) 07:37:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x4, 0x6, @broadcast}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 1813.677487] loop4: detected capacity change from 0 to 40 07:37:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, 0x0) 07:37:42 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x300000000000000, 0x0) [ 1813.915710] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:37:42 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x6, 0xff, 0x7, 0x1, 0x0, 0x1c, 0x40800, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x663d, 0x4, @perf_config_ext={0xa400000000000000, 0xe689}, 0x2090, 0x3, 0xfffffffb, 0x3, 0x0, 0x6e0, 0x1, 0x0, 0x80, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x6, r0, 0xb) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fff) ioctl$FITHAW(r1, 0xc0045878) unshare(0x40040000) 07:37:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000040)={{0x87, @broadcast, 0x4e24, 0x2, 'none\x00', 0x21, 0x1, 0x2a}, {@private=0xa010101, 0x4e24, 0x2000, 0x9, 0x100}}, 0x44) r2 = accept$packet(r1, 0x0, &(0x7f0000000100)) close(r2) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0xf7, 0x0, 0x1, 0xfd, 0x6, @random="94031c0300eb"}, 0x14) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180), 0x240000, 0x0) dup3(r0, r3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 07:37:42 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x1, 0x7, 0x9, 0x0, 0x3, 0x10, 0xf, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x2, 0x1}, 0x622, 0x0, 0x1, 0x5, 0x66d9, 0x5, 0x8, 0x0, 0x401, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) unshare(0x20000200) unshare(0x28020080) 07:37:42 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x333002, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) lseek(r2, 0x401, 0x3) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000040)) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x7fff) ppoll(&(0x7f0000000140)=[{r0, 0xa014}, {0xffffffffffffffff, 0x3018}], 0x2, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fff) close(r1) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x40, 0x0) preadv(r3, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r4, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) ioctl$TCSETSF2(r4, 0x402c542d, &(0x7f0000000000)={0x1f, 0x3, 0x1, 0x9d5, 0xff, "b112a224ccb0b3966f479573a5e81b0715181a", 0x401, 0x83b}) getdents(r3, &(0x7f00000000c0)=""/91, 0x5b) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000011c0)) 07:37:43 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x400000000000000, 0x0) 07:37:43 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) unshare(0x62000000) unshare(0x40000) unshare(0x20020400) 07:37:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x8, 0xfe, 0x6, 0x0, 0x7, 0x84a0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x140, 0x1ff, 0x0, 0x3, 0x56e, 0xfffff00f, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)={0x24, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9, 0x0, 0x0, 0x1, [@typed={0x4}, @generic='x']}]}, 0x24}], 0x1}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001140)=""/4094, 0xffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) [ 1814.360202] lo: left promiscuous mode [ 1814.360622] lo: left allmulticast mode [ 1814.452446] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:37:43 executing program 5: setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000100)={0x0, 0xfb, 0x6d, 0x1, 0x4, "7d5511df4d744099f9d9be293107a7ba", "7ad1a23bef56ac0a1578b87833f405a69f84939ed5c60e086703b5cec135888826ef4b4eecc4aa7a2050e7d45314feb8d23b2d2a5b1b6cd17df549c7a56044087ddce6d814360a03f391ab3951968f83106a925a77ac2c02"}, 0x6d, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x28020080) 07:37:43 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000200) unshare(0x40050000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x200, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x9, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000040)={{0x8, 0x5}, 0x0, 0x0, 0x401, {0x0, 0x81}, 0x80, 0x2}) unshare(0x200) r2 = getpid() pidfd_open(r2, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x3, 0x0, 0x0, 0x7ff}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x0, 0xfc, 0x9, 0x2, 0x0, 0x81, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xbfda, 0x4, @perf_config_ext={0x7f, 0xfa7}, 0x4380, 0x8459, 0x82, 0x3, 0x4, 0xffffffff, 0x400, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, r1, 0x10) pidfd_send_signal(0xffffffffffffffff, 0x41, &(0x7f0000000280)={0x18, 0x5, 0xb308}, 0x0) unshare(0x28020080) 07:37:43 executing program 6: syz_80211_join_ibss(&(0x7f0000000100)='wlan1\x00', 0x0, 0x500000000000000, 0x0) 07:37:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) sendfile(r1, r0, 0x0, 0xfffffdef) [ 1814.852671] loop4: detected capacity change from 0 to 40 [ 1814.941550] ------------[ cut here ]------------ [ 1814.942126] WARNING: CPU: 0 PID: 10858 at net/ipv4/ipmr.c:440 ipmr_rules_exit+0x13a/0x1c0 [ 1814.942884] Modules linked in: [ 1814.943261] CPU: 0 UID: 0 PID: 10858 Comm: syz-executor.0 Not tainted 6.13.0-rc3-next-20241218 #1 [ 1814.944040] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1814.944777] RIP: 0010:ipmr_rules_exit+0x13a/0x1c0 [ 1814.945256] Code: ff df 48 c1 ea 03 80 3c 02 00 75 7d 48 c7 83 00 08 00 00 00 00 00 00 5b 5d 41 5c 41 5d 41 5e e9 fc 7a a3 00 e8 c7 34 6b fd 90 <0f> 0b 90 eb 93 e8 bc 34 6b fd 0f b6 2d 3d 7e 36 02 31 ff 89 ee e8 [ 1814.946812] RSP: 0018:ffff8880154e7c20 EFLAGS: 00010212 [ 1814.947323] RAX: 0000000000026674 RBX: ffff88803d75ae00 RCX: ffffc900029ec000 [ 1814.947964] RDX: 0000000000040000 RSI: ffffffff84068e29 RDI: 0000000000000005 [ 1814.948615] RBP: ffff8880403b8000 R08: 0000000000000000 R09: ffffed1007aeb5e9 [ 1814.949259] R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000001 [ 1814.950521] R13: ffff88803d75b600 R14: ffff88803d75ae00 R15: fffffbfff0c51128 [ 1814.952256] FS: 00007f1194e8f700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 1814.954069] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1814.955803] CR2: 0000564b00640130 CR3: 0000000034804000 CR4: 0000000000350ef0 [ 1814.957388] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1814.959005] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1814.959661] Call Trace: [ 1814.959912] [ 1814.960170] ? __warn+0xea/0x380 [ 1814.960516] ? ipmr_rules_exit+0x13a/0x1c0 [ 1814.960922] ? report_bug+0x2f5/0x3f0 [ 1814.961351] ? ipmr_rules_exit+0x13a/0x1c0 [ 1814.961755] ? ipmr_rules_exit+0x13b/0x1c0 [ 1814.962189] ? handle_bug+0xe5/0x180 [ 1814.962568] ? exc_invalid_op+0x35/0x80 [ 1814.962961] ? asm_exc_invalid_op+0x1a/0x20 [ 1814.963428] ? ipmr_rules_exit+0x139/0x1c0 [ 1814.963843] ? ipmr_rules_exit+0x13a/0x1c0 [ 1814.964286] ipmr_net_exit_batch+0x53/0xa0 [ 1814.964684] ? __pfx_ipmr_net_exit_batch+0x10/0x10 [ 1814.965165] ? __pfx_ipmr_net_exit+0x10/0x10 [ 1814.965605] ops_exit_list+0x12b/0x180 [ 1814.966012] setup_net+0x492/0x7a0 [ 1814.966400] ? __pfx_setup_net+0x10/0x10 [ 1814.966790] ? __pfx_down_read_killable+0x10/0x10 [ 1814.967269] ? __raw_spin_lock_init+0x3a/0x110 [ 1814.967738] ? srso_return_thunk+0x5/0x5f [ 1814.968161] ? debug_mutex_init+0x37/0x70 [ 1814.968589] copy_net_ns+0x2e3/0x700 [ 1814.968958] create_new_namespaces+0x3f6/0xaf0 [ 1814.969444] unshare_nsproxy_namespaces+0xc0/0x200 [ 1814.969915] ksys_unshare+0x46a/0xa10 [ 1814.970339] ? __pfx_ksys_unshare+0x10/0x10 [ 1814.970765] ? xfd_validate_state+0x51/0x180 [ 1814.971243] ? srso_return_thunk+0x5/0x5f [ 1814.971650] ? trace_x86_fpu_regs_activated+0x130/0x190 [ 1814.972192] __x64_sys_unshare+0x31/0x40 [ 1814.972604] do_syscall_64+0xbf/0x1d0 [ 1814.972977] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1814.973490] RIP: 0033:0x7f119793ab19 [ 1814.973838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1814.975360] RSP: 002b:00007f1194e8f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1814.976040] RAX: ffffffffffffffda RBX: 00007f1197a4e020 RCX: 00007f119793ab19 [ 1814.976686] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040040000 [ 1814.977328] RBP: 00007f1197994f6d R08: 0000000000000000 R09: 0000000000000000 [ 1814.977939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1814.978580] R13: 00007fff7720d27f R14: 00007f1194e8f300 R15: 0000000000022000 [ 1814.979250] [ 1814.979481] irq event stamp: 12255 [ 1814.979812] hardirqs last enabled at (12265): [] __up_console_sem+0x78/0x80 [ 1814.980613] hardirqs last disabled at (12276): [] __up_console_sem+0x5d/0x80 [ 1814.981401] softirqs last enabled at (11686): [] handle_softirqs+0x50c/0x770 [ 1814.982193] softirqs last disabled at (11679): [] __irq_exit_rcu+0xc4/0x100 [ 1814.982947] ---[ end trace 0000000000000000 ]--- VM DIAGNOSIS: 07:37:43 Registers: info registers vcpu 0 RAX=0000000000000030 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff82840465 RDI=ffffffff886890a0 RBP=ffffffff88689060 RSP=ffff8880154e7560 R8 =0000000000000000 R9 =ffffed100134f046 R10=0000000000000030 R11=0000000000000000 R12=0000000000000030 R13=ffffffff88689060 R14=0000000000000010 R15=ffffffff82840450 RIP=ffffffff828404bd RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f1194e8f700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000564b00640130 CR3=0000000034804000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000002 RBX=0000000000000000 RCX=00007f2f852c508c RDX=0000000000001fa0 RSI=00007f2f84861d00 RDI=0000000000000000 RBP=000056122a7d24c0 RSP=00007f2f848614c8 R8 =0000000000000000 R9 =000056122a7cee88 R10=a3d70a3d70a3d70b R11=0000000000000246 R12=00007f2f84861d00 R13=0000000000001fa0 R14=00007f2f84861d00 R15=00007f2f84861d54 RIP=00007f2f852c4d70 RFL=00000246 [---Z-P-] CPL=3 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0033 0000000000000000 ffffffff 00a0fb00 DPL=3 CS64 [-RA] SS =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f2f84882700 00000000 00000000 GS =0000 0000000000000000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fefceac67f0 CR3=00000000070da000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=000000000000000000000000000000ff XMM02=000000000000000000000000000000ff XMM03=353764333038383866666666203a3331 XMM04=30203633206537206433206432203662 XMM05=3865203339206265203039206230203e XMM06=37632038652030302033612061372063 XMM07=00000000000000000000000000000000 XMM08=203835383031203a4449502030203a00 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000