)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x2, 0x1)
00:39:40 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 37)
00:39:40 executing program 1:
unshare(0x8000000)
r0 = semget$private(0x0, 0x1, 0x0)
semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x5])
semop(r0, &(0x7f00000000c0)=[{0x0, 0x48, 0x1000}], 0x1)
unshare(0x1e020000)
r1 = semget$private(0x0, 0x0, 0x50c)
semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000100)=[0xb954, 0x1, 0x0, 0x4b3e, 0xb34])
unshare(0x46020280)
semctl$IPC_RMID(r1, 0x0, 0x0)
unshare(0x40a00)
semctl$GETZCNT(0xffffffffffffffff, 0x2, 0xf, &(0x7f0000000000)=""/74)
[ 1302.280466] FAULT_INJECTION: forcing a failure.
[ 1302.280466] name failslab, interval 1, probability 0, space 0, times 0
[ 1302.281269] CPU: 0 PID: 11973 Comm: syz-executor.7 Not tainted 6.3.0-next-20230428 #1
[ 1302.281792] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1302.282343] Call Trace:
[ 1302.282525]
[ 1302.282694] dump_stack_lvl+0xc1/0xf0
[ 1302.282967] should_fail_ex+0x4b4/0x5b0
[ 1302.283267] should_failslab+0x9/0x20
[ 1302.283548] __kmem_cache_alloc_node+0x5b/0x310
[ 1302.283891] ? memcg_list_lru_alloc+0x518/0xb20
[ 1302.284236] ? memcg_list_lru_alloc+0x518/0xb20
[ 1302.284584] __kmalloc+0x4a/0x160
[ 1302.284846] memcg_list_lru_alloc+0x518/0xb20
[ 1302.285170] ? kmem_cache_alloc_lru+0xfd/0x600
[ 1302.285492] ? __pfx_memcg_list_lru_alloc+0x10/0x10
[ 1302.285876] kmem_cache_alloc_lru+0x125/0x600
[ 1302.286190] ? shmem_alloc_inode+0x27/0x50
[ 1302.286508] shmem_alloc_inode+0x27/0x50
[ 1302.286799] ? __pfx_shmem_alloc_inode+0x10/0x10
[ 1302.287132] alloc_inode+0x63/0x240
[ 1302.287398] new_inode+0x25/0x1f0
[ 1302.287661] shmem_get_inode+0x183/0xeb0
[ 1302.287978] shmem_fill_super+0x708/0xe30
[ 1302.288282] ? __pfx_shmem_fill_super+0x10/0x10
[ 1302.288619] vfs_get_super+0xf0/0x280
[ 1302.288904] vfs_get_tree+0x92/0x360
[ 1302.289182] path_mount+0x1335/0x1e40
[ 1302.289470] ? kasan_quarantine_put+0x81/0x1d0
[ 1302.289796] ? __pfx_path_mount+0x10/0x10
[ 1302.290089] ? putname+0x102/0x140
[ 1302.290353] ? kmem_cache_free+0xff/0x4a0
[ 1302.290675] ? putname+0x102/0x140
[ 1302.290968] __x64_sys_mount+0x286/0x310
[ 1302.291283] ? __pfx___x64_sys_mount+0x10/0x10
[ 1302.291638] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1302.292044] do_syscall_64+0x3f/0x90
[ 1302.292340] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1302.292721] RIP: 0033:0x7f6ff74eb04a
[ 1302.293001] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1302.294284] RSP: 002b:00007f6ff4a5efa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1302.294827] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6ff74eb04a
[ 1302.295346] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1302.295867] RBP: 00007f6ff4a5f040 R08: 00007f6ff4a5f040 R09: 00000000200000c0
[ 1302.296383] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1302.296910] R13: 0000000020000000 R14: 00007f6ff4a5f000 R15: 0000000020000040
[ 1302.297454]
[ 1302.333059] FAULT_INJECTION: forcing a failure.
[ 1302.333059] name failslab, interval 1, probability 0, space 0, times 0
[ 1302.333893] CPU: 1 PID: 12055 Comm: syz-executor.4 Not tainted 6.3.0-next-20230428 #1
[ 1302.334412] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1302.334952] Call Trace:
[ 1302.335136]
[ 1302.335302] dump_stack_lvl+0xc1/0xf0
[ 1302.335579] should_fail_ex+0x4b4/0x5b0
[ 1302.335889] should_failslab+0x9/0x20
[ 1302.336171] __kmem_cache_alloc_node+0x5b/0x310
[ 1302.336522] ? alloc_fs_context+0x58/0x9e0
[ 1302.336828] kmalloc_trace+0x26/0xc0
[ 1302.337099] alloc_fs_context+0x58/0x9e0
[ 1302.337400] path_mount+0xa6a/0x1e40
[ 1302.337694] ? kasan_quarantine_put+0x81/0x1d0
[ 1302.338024] ? __pfx_path_mount+0x10/0x10
[ 1302.338328] ? putname+0x102/0x140
[ 1302.338600] ? kmem_cache_free+0xff/0x4a0
[ 1302.338884] ? putname+0x102/0x140
[ 1302.339163] __x64_sys_mount+0x286/0x310
[ 1302.339470] ? __pfx___x64_sys_mount+0x10/0x10
[ 1302.339785] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1302.340175] do_syscall_64+0x3f/0x90
[ 1302.340447] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1302.340813] RIP: 0033:0x7f140720e04a
[ 1302.341076] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1302.342288] RSP: 002b:00007f1404781fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1302.342807] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f140720e04a
[ 1302.343285] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1302.343809] RBP: 00007f1404782040 R08: 00007f1404782040 R09: 00000000200000c0
[ 1302.344355] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1302.344863] R13: 0000000020000000 R14: 00007f1404782000 R15: 0000000020000040
[ 1302.345377]
00:39:52 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x0)
00:39:52 executing program 2:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000340))
r1 = socket$inet6(0xa, 0x4, 0x2)
connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x8, @local}, 0x1c)
00:39:52 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
dup(r0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x10000, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r4, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:39:52 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x300, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:39:52 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 32)
00:39:52 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 43)
00:39:52 executing program 3:
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
r2 = getpid()
clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[r0, r0, r2], 0x3}, 0x58)
r3 = fork()
r4 = getpgid(r3)
syz_open_procfs(r4, &(0x7f0000000000)='sessionid\x00')
sched_rr_get_interval(r4, &(0x7f0000000040))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0))
open(&(0x7f00000015c0)='./file1\x00', 0x28000, 0x40)
fcntl$getown(r1, 0x9)
00:39:53 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 38)
00:39:53 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x500, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:39:53 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 39)
00:39:53 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
dup(r0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x10000, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r4, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:39:53 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 44)
[ 1315.049301] FAULT_INJECTION: forcing a failure.
[ 1315.049301] name failslab, interval 1, probability 0, space 0, times 0
[ 1315.050190] CPU: 1 PID: 12088 Comm: syz-executor.4 Not tainted 6.3.0-next-20230428 #1
[ 1315.050866] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1315.051551] Call Trace:
[ 1315.051778]
[ 1315.051992] dump_stack_lvl+0xc1/0xf0
[ 1315.052343] should_fail_ex+0x4b4/0x5b0
[ 1315.052713] should_failslab+0x9/0x20
[ 1315.053062] __kmem_cache_alloc_node+0x5b/0x310
[ 1315.053476] ? shmem_init_fs_context+0x45/0x280
[ 1315.053895] ? __pfx_shmem_init_fs_context+0x10/0x10
[ 1315.054346] kmalloc_trace+0x26/0xc0
[ 1315.054675] shmem_init_fs_context+0x45/0x280
[ 1315.055061] ? __pfx_shmem_init_fs_context+0x10/0x10
[ 1315.055506] alloc_fs_context+0x571/0x9e0
[ 1315.055879] path_mount+0xa6a/0x1e40
[ 1315.056232] ? kasan_quarantine_put+0x81/0x1d0
[ 1315.056636] ? __pfx_path_mount+0x10/0x10
[ 1315.057009] ? putname+0x102/0x140
[ 1315.057326] ? kmem_cache_free+0xff/0x4a0
[ 1315.057698] ? putname+0x102/0x140
[ 1315.058028] __x64_sys_mount+0x286/0x310
[ 1315.058394] ? __pfx___x64_sys_mount+0x10/0x10
[ 1315.058812] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1315.059272] do_syscall_64+0x3f/0x90
[ 1315.059601] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1315.059971] RIP: 0033:0x7f140720e04a
[ 1315.060314] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1315.061517] RSP: 002b:00007f1404781fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1315.062141] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f140720e04a
[ 1315.062732] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1315.063323] RBP: 00007f1404782040 R08: 00007f1404782040 R09: 00000000200000c0
[ 1315.063900] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1315.064513] R13: 0000000020000000 R14: 00007f1404782000 R15: 0000000020000040
[ 1315.065145]
00:39:53 executing program 0:
openat(0xffffffffffffff9c, 0x0, 0x840, 0x0)
00:39:53 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x600, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:39:53 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 33)
00:39:53 executing program 0:
openat(0xffffffffffffff9c, 0x0, 0x840, 0x0)
00:39:53 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 45)
[ 1315.276894] FAULT_INJECTION: forcing a failure.
[ 1315.276894] name failslab, interval 1, probability 0, space 0, times 0
[ 1315.277995] CPU: 1 PID: 12205 Comm: syz-executor.5 Not tainted 6.3.0-next-20230428 #1
[ 1315.278659] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1315.279350] Call Trace:
[ 1315.279584]
[ 1315.279791] dump_stack_lvl+0xc1/0xf0
[ 1315.280135] should_fail_ex+0x4b4/0x5b0
[ 1315.280511] should_failslab+0x9/0x20
[ 1315.280850] __kmem_cache_alloc_node+0x5b/0x310
[ 1315.281260] ? __list_lru_init+0xcb/0x610
[ 1315.281631] ? __list_lru_init+0xcb/0x610
[ 1315.281992] __kmalloc+0x4a/0x160
[ 1315.282307] __list_lru_init+0xcb/0x610
[ 1315.282672] alloc_super+0x91d/0xb00
[ 1315.283012] sget_fc+0x142/0x7a0
[ 1315.283313] ? __pfx_set_anon_super_fc+0x10/0x10
[ 1315.283739] ? __pfx_shmem_fill_super+0x10/0x10
[ 1315.284090] vfs_get_super+0x2d/0x280
[ 1315.284424] vfs_get_tree+0x92/0x360
[ 1315.284769] path_mount+0x1335/0x1e40
[ 1315.285121] ? kasan_quarantine_put+0x81/0x1d0
[ 1315.285527] ? __pfx_path_mount+0x10/0x10
[ 1315.285895] ? putname+0x102/0x140
[ 1315.286219] ? kmem_cache_free+0xff/0x4a0
[ 1315.286593] ? putname+0x102/0x140
[ 1315.286929] __x64_sys_mount+0x286/0x310
[ 1315.287289] ? __pfx___x64_sys_mount+0x10/0x10
[ 1315.287631] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1315.288112] do_syscall_64+0x3f/0x90
[ 1315.288458] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1315.288905] RIP: 0033:0x7f242be6304a
[ 1315.289226] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1315.290718] RSP: 002b:00007f24293d6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1315.291348] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f242be6304a
[ 1315.291941] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1315.292553] RBP: 00007f24293d7040 R08: 00007f24293d7040 R09: 00000000200000c0
[ 1315.293148] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1315.293744] R13: 0000000020000000 R14: 00007f24293d7000 R15: 0000000020000040
[ 1315.294374]
00:40:10 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 34)
00:40:10 executing program 3:
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
r2 = getpid()
clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[r0, r0, r2], 0x3}, 0x58)
r3 = fork()
r4 = getpgid(r3)
syz_open_procfs(r4, &(0x7f0000000000)='sessionid\x00')
sched_rr_get_interval(r4, &(0x7f0000000040))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0))
open(&(0x7f00000015c0)='./file1\x00', 0x28000, 0x40)
fcntl$getown(r1, 0x9)
00:40:10 executing program 2:
perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x0)
r0 = fsopen(&(0x7f0000000080)='sysfs\x00', 0x0)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7, 0x63, 0x3, 0x5, 0x0, 0x7fff, 0x40080, 0x11, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x101, 0x4}, 0x0, 0x4, 0x4, 0x0, 0x390, 0x3f, 0x2, 0x0, 0xfff, 0x0, 0x5}, 0xffffffffffffffff, 0x7, r0, 0xb)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_timeval(r1, 0x1, 0x1b, &(0x7f0000000200), 0x10)
lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
fchown(r1, 0xee01, r2)
r3 = fsopen(&(0x7f0000000240)='tmpfs\x00', 0x0)
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'})
fsconfig$FSCONFIG_SET_STRING(r3, 0x6, 0x0, 0x0, 0x0)
r4 = dup3(r0, r3, 0x0)
r5 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder-control\x00', 0x2, 0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r4, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r5, {0x6}}, './file0\x00'})
setsockopt$WPAN_WANTLQI(r6, 0x0, 0x3, &(0x7f0000000040), 0x4)
00:40:10 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
dup(r0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x10000, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r4, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:40:10 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 40)
00:40:10 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x700, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:40:10 executing program 0:
openat(0xffffffffffffff9c, 0x0, 0x840, 0x0)
00:40:10 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 46)
00:40:10 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
00:40:10 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x900, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:40:10 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 35)
00:40:10 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 41)
00:40:11 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 47)
00:40:11 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
dup(r0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x10000, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r4, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
[ 1332.965221] FAULT_INJECTION: forcing a failure.
[ 1332.965221] name failslab, interval 1, probability 0, space 0, times 0
[ 1332.966170] CPU: 1 PID: 12234 Comm: syz-executor.5 Not tainted 6.3.0-next-20230428 #1
[ 1332.966666] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1332.967164] Call Trace:
[ 1332.967335]
[ 1332.967494] dump_stack_lvl+0xc1/0xf0
[ 1332.967767] should_fail_ex+0x4b4/0x5b0
[ 1332.968055] should_failslab+0x9/0x20
[ 1332.968329] __kmem_cache_alloc_node+0x5b/0x310
[ 1332.968648] ? shmem_fill_super+0x7b/0xe30
[ 1332.968940] kmalloc_trace+0x26/0xc0
[ 1332.969193] shmem_fill_super+0x7b/0xe30
[ 1332.969458] ? __pfx_set_anon_super_fc+0x10/0x10
[ 1332.969776] ? __pfx_shmem_fill_super+0x10/0x10
[ 1332.970075] vfs_get_super+0xf0/0x280
[ 1332.970345] vfs_get_tree+0x92/0x360
[ 1332.970614] path_mount+0x1335/0x1e40
[ 1332.970890] ? kasan_quarantine_put+0x81/0x1d0
[ 1332.971197] ? __pfx_path_mount+0x10/0x10
[ 1332.971472] ? putname+0x102/0x140
[ 1332.971723] ? kmem_cache_free+0xff/0x4a0
[ 1332.972009] ? putname+0x102/0x140
[ 1332.972278] __x64_sys_mount+0x286/0x310
[ 1332.972555] ? __pfx___x64_sys_mount+0x10/0x10
[ 1332.972867] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1332.973211] do_syscall_64+0x3f/0x90
[ 1332.973465] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1332.973808] RIP: 0033:0x7f242be6304a
[ 1332.974047] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1332.975140] RSP: 002b:00007f24293d6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1332.975613] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f242be6304a
[ 1332.976053] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1332.976512] RBP: 00007f24293d7040 R08: 00007f24293d7040 R09: 00000000200000c0
[ 1332.976964] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1332.977421] R13: 0000000020000000 R14: 00007f24293d7000 R15: 0000000020000040
[ 1332.977904]
00:40:11 executing program 2:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='mqueue\x00', 0x0, 0x0)
r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
getdents(r0, &(0x7f00000012c0)=""/4093, 0x18)
getdents64(r0, &(0x7f0000000140)=""/174, 0xae)
00:40:11 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0xa00, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
[ 1332.997238] FAULT_INJECTION: forcing a failure.
[ 1332.997238] name failslab, interval 1, probability 0, space 0, times 0
[ 1332.998773] CPU: 0 PID: 12236 Comm: syz-executor.4 Not tainted 6.3.0-next-20230428 #1
[ 1332.999798] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1333.000845] Call Trace:
[ 1333.001204]
[ 1333.001524] dump_stack_lvl+0xc1/0xf0
[ 1333.002055] should_fail_ex+0x4b4/0x5b0
[ 1333.002632] should_failslab+0x9/0x20
[ 1333.003162] __kmem_cache_alloc_node+0x5b/0x310
[ 1333.003801] ? vfs_parse_fs_string+0xc4/0x150
[ 1333.004479] ? vfs_parse_fs_string+0xc4/0x150
[ 1333.005101] __kmalloc_node_track_caller+0x4b/0x160
[ 1333.005795] kmemdup_nul+0x36/0xb0
[ 1333.006303] vfs_parse_fs_string+0xc4/0x150
[ 1333.006928] ? __pfx_vfs_parse_fs_string+0x10/0x10
[ 1333.007687] shmem_parse_options+0x164/0x250
[ 1333.008347] path_mount+0x12ed/0x1e40
[ 1333.008925] ? kasan_quarantine_put+0x81/0x1d0
[ 1333.009579] ? __pfx_path_mount+0x10/0x10
[ 1333.010180] ? putname+0x102/0x140
[ 1333.010699] ? kmem_cache_free+0xff/0x4a0
[ 1333.011302] ? putname+0x102/0x140
[ 1333.011845] __x64_sys_mount+0x286/0x310
[ 1333.012452] ? __pfx___x64_sys_mount+0x10/0x10
[ 1333.013121] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1333.013868] do_syscall_64+0x3f/0x90
[ 1333.014412] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1333.015146] RIP: 0033:0x7f140720e04a
[ 1333.015672] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1333.018085] RSP: 002b:00007f1404781fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1333.019125] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f140720e04a
[ 1333.020090] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1333.021048] RBP: 00007f1404782040 R08: 00007f1404782040 R09: 00000000200000c0
[ 1333.022016] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1333.022971] R13: 0000000020000000 R14: 00007f1404782000 R15: 0000000020000040
[ 1333.023987]
00:40:11 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
[ 1333.072013] FAULT_INJECTION: forcing a failure.
[ 1333.072013] name failslab, interval 1, probability 0, space 0, times 0
[ 1333.073608] CPU: 0 PID: 12241 Comm: syz-executor.7 Not tainted 6.3.0-next-20230428 #1
[ 1333.074717] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1333.075842] Call Trace:
[ 1333.076224]
[ 1333.076565] dump_stack_lvl+0xc1/0xf0
[ 1333.077131] should_fail_ex+0x4b4/0x5b0
[ 1333.077743] ? security_inode_alloc+0x38/0x160
00:40:11 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 36)
[ 1333.078413] should_failslab+0x9/0x20
[ 1333.079022] kmem_cache_alloc+0x5a/0x390
[ 1333.079644] security_inode_alloc+0x38/0x160
[ 1333.080330] inode_init_always+0xbb2/0xea0
[ 1333.080995] alloc_inode+0x84/0x240
[ 1333.081543] new_inode+0x25/0x1f0
[ 1333.082086] shmem_get_inode+0x183/0xeb0
[ 1333.082733] shmem_fill_super+0x708/0xe30
[ 1333.083373] ? __pfx_shmem_fill_super+0x10/0x10
[ 1333.084066] vfs_get_super+0xf0/0x280
[ 1333.084667] vfs_get_tree+0x92/0x360
[ 1333.085265] path_mount+0x1335/0x1e40
[ 1333.085888] ? kasan_quarantine_put+0x81/0x1d0
[ 1333.086589] ? __pfx_path_mount+0x10/0x10
[ 1333.087221] ? putname+0x102/0x140
[ 1333.087774] ? kmem_cache_free+0xff/0x4a0
[ 1333.088429] ? putname+0x102/0x140
[ 1333.089006] __x64_sys_mount+0x286/0x310
[ 1333.089649] ? __pfx___x64_sys_mount+0x10/0x10
[ 1333.090362] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1333.091148] do_syscall_64+0x3f/0x90
[ 1333.091723] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1333.092501] RIP: 0033:0x7f6ff74eb04a
[ 1333.093052] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1333.095317] RSP: 002b:00007f6ff4a5efa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1333.096251] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6ff74eb04a
[ 1333.097110] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1333.098011] RBP: 00007f6ff4a5f040 R08: 00007f6ff4a5f040 R09: 00000000200000c0
[ 1333.098930] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1333.099830] R13: 0000000020000000 R14: 00007f6ff4a5f000 R15: 0000000020000040
[ 1333.100815]
00:40:11 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0xb00, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:40:23 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 48)
00:40:23 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
00:40:23 executing program 3:
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
r2 = getpid()
clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[r0, r0, r2], 0x3}, 0x58)
r3 = fork()
r4 = getpgid(r3)
syz_open_procfs(r4, &(0x7f0000000000)='sessionid\x00')
sched_rr_get_interval(r4, &(0x7f0000000040))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0))
open(&(0x7f00000015c0)='./file1\x00', 0x28000, 0x40)
fcntl$getown(r1, 0x9)
00:40:23 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 37)
00:40:23 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
dup(r0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x10000, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:40:23 executing program 2:
r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80000, 0xa6)
openat(r0, &(0x7f0000000100)='./file0\x00', 0x96000, 0x4)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pwritev(r0, 0x0, 0x0, 0x9e, 0x8)
openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0)
pwritev(0xffffffffffffffff, &(0x7f0000000640)=[{0x0}], 0x1, 0x20, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040))
syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='fd\x00')
fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwritev(r2, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffff8, 0x0)
open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x80000)
ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000180)=ANY=[@ANYBLOB="0107010000000000000800c17b8159c66d5b48b8b323a5ce4f4a980e9b8782bc8681cdd05fa7845478fc0aa80e8dfaeedefcf360b6b25e38343ef3ae7401e42d14e3c150ea357d9b3522b8e0c09c01820c29a8c64074775a314b329b36ac765034ee80ddfdf7a2f2b75f8b87b24ddae967cc2860d2c80177fd147771fc8073e8a3d275d99e6c2a", @ANYRES32=r1])
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0x4e}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, r2, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r1, r1, 0x0, 0x100000)
00:40:23 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 42)
00:40:23 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0xf00, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:40:24 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 49)
00:40:24 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 38)
00:40:24 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 43)
00:40:24 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x1100, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:40:24 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
dup(r0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x10000, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
[ 1346.173539] FAULT_INJECTION: forcing a failure.
[ 1346.173539] name failslab, interval 1, probability 0, space 0, times 0
[ 1346.175120] CPU: 0 PID: 12427 Comm: syz-executor.7 Not tainted 6.3.0-next-20230428 #1
[ 1346.176090] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1346.177100] Call Trace:
[ 1346.177432]
[ 1346.177732] dump_stack_lvl+0xc1/0xf0
[ 1346.178236] should_fail_ex+0x4b4/0x5b0
[ 1346.178783] should_failslab+0x9/0x20
[ 1346.179327] kmem_cache_alloc_lru+0x6b/0x600
[ 1346.179969] ? __d_alloc+0x31/0x9c0
[ 1346.180479] __d_alloc+0x31/0x9c0
[ 1346.180938] ? shmem_get_inode+0x6be/0xeb0
[ 1346.181508] d_make_root+0x49/0x120
[ 1346.181993] shmem_fill_super+0x7d7/0xe30
[ 1346.182532] ? __pfx_shmem_fill_super+0x10/0x10
[ 1346.183131] vfs_get_super+0xf0/0x280
[ 1346.183638] vfs_get_tree+0x92/0x360
[ 1346.184142] path_mount+0x1335/0x1e40
[ 1346.184674] ? kasan_quarantine_put+0x81/0x1d0
[ 1346.185276] ? __pfx_path_mount+0x10/0x10
[ 1346.185817] ? putname+0x102/0x140
[ 1346.186291] ? kmem_cache_free+0xff/0x4a0
[ 1346.186954] ? putname+0x102/0x140
[ 1346.187447] __x64_sys_mount+0x286/0x310
[ 1346.187983] ? __pfx___x64_sys_mount+0x10/0x10
[ 1346.188608] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1346.189301] do_syscall_64+0x3f/0x90
[ 1346.189789] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1346.190445] RIP: 0033:0x7f6ff74eb04a
[ 1346.190916] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1346.193073] RSP: 002b:00007f6ff4a5efa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1346.193994] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6ff74eb04a
[ 1346.194862] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1346.195731] RBP: 00007f6ff4a5f040 R08: 00007f6ff4a5f040 R09: 00000000200000c0
[ 1346.196607] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1346.197517] R13: 0000000020000000 R14: 00007f6ff4a5f000 R15: 0000000020000040
[ 1346.198423]
[ 1346.249690] FAULT_INJECTION: forcing a failure.
[ 1346.249690] name failslab, interval 1, probability 0, space 0, times 0
[ 1346.251642] CPU: 0 PID: 12479 Comm: syz-executor.4 Not tainted 6.3.0-next-20230428 #1
[ 1346.252818] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1346.254008] Call Trace:
[ 1346.254414]
[ 1346.254780] dump_stack_lvl+0xc1/0xf0
[ 1346.255384] should_fail_ex+0x4b4/0x5b0
[ 1346.256042] ? mpol_new+0x117/0x2e0
[ 1346.256621] should_failslab+0x9/0x20
[ 1346.257233] kmem_cache_alloc+0x5a/0x390
[ 1346.257893] mpol_new+0x117/0x2e0
[ 1346.258468] mpol_parse_str+0x49f/0xad0
[ 1346.259104] ? fs_param_is_string+0xc6/0x200
[ 1346.259812] ? __pfx_mpol_parse_str+0x10/0x10
[ 1346.260607] shmem_parse_one+0x6d2/0xce0
[ 1346.261258] ? __pfx_shmem_parse_one+0x10/0x10
[ 1346.261851] ? __kmem_cache_alloc_node+0x1bc/0x310
[ 1346.262504] ? __pfx_shmem_parse_one+0x10/0x10
[ 1346.263093] vfs_parse_fs_param+0x208/0x3d0
[ 1346.263658] vfs_parse_fs_string+0xea/0x150
[ 1346.264213] ? __pfx_vfs_parse_fs_string+0x10/0x10
[ 1346.264903] shmem_parse_options+0x164/0x250
[ 1346.265496] path_mount+0x12ed/0x1e40
[ 1346.266016] ? kasan_quarantine_put+0x81/0x1d0
[ 1346.266612] ? __pfx_path_mount+0x10/0x10
[ 1346.267172] ? putname+0x102/0x140
[ 1346.267638] ? kmem_cache_free+0xff/0x4a0
[ 1346.268340] ? putname+0x102/0x140
[ 1346.268846] __x64_sys_mount+0x286/0x310
[ 1346.269386] ? __pfx___x64_sys_mount+0x10/0x10
[ 1346.269997] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1346.270682] do_syscall_64+0x3f/0x90
[ 1346.271165] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1346.271813] RIP: 0033:0x7f140720e04a
[ 1346.272289] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1346.274424] RSP: 002b:00007f1404781fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1346.275347] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f140720e04a
[ 1346.276189] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1346.277054] RBP: 00007f1404782040 R08: 00007f1404782040 R09: 00000000200000c0
[ 1346.278068] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1346.278922] R13: 0000000020000000 R14: 00007f1404782000 R15: 0000000020000040
[ 1346.279819]
[ 1346.280332] tmpfs: Bad value for 'mpol'
00:40:39 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x1300, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:40:39 executing program 2:
r0 = syz_io_uring_setup(0x43be, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0))
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0x0)
ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x80000000}}, './file1\x00'})
write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220)
sendfile(r2, r1, 0x0, 0xfffffdef)
close_range(r0, 0xffffffffffffffff, 0x0)
00:40:39 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 44)
00:40:39 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x0) (fail_nth: 1)
00:40:39 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 50)
00:40:39 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
dup(r0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x10000, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:40:39 executing program 3:
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
r2 = getpid()
clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[r0, r0, r2], 0x3}, 0x58)
r3 = fork()
r4 = getpgid(r3)
syz_open_procfs(r4, &(0x7f0000000000)='sessionid\x00')
sched_rr_get_interval(r4, &(0x7f0000000040))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0))
open(&(0x7f00000015c0)='./file1\x00', 0x28000, 0x40)
fcntl$getown(r1, 0x9)
00:40:39 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 39)
[ 1361.738805] FAULT_INJECTION: forcing a failure.
[ 1361.738805] name failslab, interval 1, probability 0, space 0, times 0
[ 1361.739616] CPU: 0 PID: 12500 Comm: syz-executor.0 Not tainted 6.3.0-next-20230428 #1
[ 1361.740141] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1361.740698] Call Trace:
[ 1361.740877]
[ 1361.741039] dump_stack_lvl+0xc1/0xf0
[ 1361.741314] should_fail_ex+0x4b4/0x5b0
[ 1361.741607] ? getname_flags.part.0+0x50/0x4f0
[ 1361.741929] should_failslab+0x9/0x20
[ 1361.742208] kmem_cache_alloc+0x5a/0x390
[ 1361.742499] ? __pfx_lock_release+0x10/0x10
[ 1361.742811] getname_flags.part.0+0x50/0x4f0
[ 1361.743123] ? rcu_read_lock_any_held+0x79/0xa0
[ 1361.743462] getname+0x92/0xe0
[ 1361.743691] do_sys_openat2+0xf9/0x4c0
[ 1361.743978] ? __pfx_do_sys_openat2+0x10/0x10
[ 1361.744310] __x64_sys_openat+0x143/0x200
[ 1361.744621] ? __pfx___x64_sys_openat+0x10/0x10
[ 1361.744948] ? ksys_write+0x1a7/0x260
[ 1361.745225] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1361.745228] FAULT_INJECTION: forcing a failure.
[ 1361.745228] name failslab, interval 1, probability 0, space 0, times 0
[ 1361.745581] do_syscall_64+0x3f/0x90
[ 1361.745604] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1361.745629] RIP: 0033:0x7f66595d6b19
[ 1361.745642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1361.748598] RSP: 002b:00007f6656b4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[ 1361.749107] RAX: ffffffffffffffda RBX: 00007f66596e9f60 RCX: 00007f66595d6b19
[ 1361.749587] RDX: 0000000000000840 RSI: 0000000020000080 RDI: ffffffffffffff9c
[ 1361.750092] RBP: 00007f6656b4c1d0 R08: 0000000000000000 R09: 0000000000000000
[ 1361.750593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 1361.751091] R13: 00007fffe152e69f R14: 00007f6656b4c300 R15: 0000000000022000
[ 1361.751616]
[ 1361.751790] CPU: 1 PID: 12497 Comm: syz-executor.5 Not tainted 6.3.0-next-20230428 #1
[ 1361.752545] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1361.753540] Call Trace:
[ 1361.753872]
[ 1361.754204] dump_stack_lvl+0xc1/0xf0
[ 1361.754780] should_fail_ex+0x4b4/0x5b0
[ 1361.755408] should_failslab+0x9/0x20
[ 1361.756024] kmem_cache_alloc_lru+0x6b/0x600
[ 1361.756482] ? shmem_alloc_inode+0x27/0x50
[ 1361.756910] ? __pfx_lock_release+0x10/0x10
[ 1361.757331] shmem_alloc_inode+0x27/0x50
[ 1361.757726] ? __pfx_shmem_alloc_inode+0x10/0x10
[ 1361.758164] alloc_inode+0x63/0x240
[ 1361.758519] new_inode+0x25/0x1f0
[ 1361.758851] shmem_get_inode+0x183/0xeb0
[ 1361.759256] shmem_fill_super+0x708/0xe30
[ 1361.759672] ? __pfx_shmem_fill_super+0x10/0x10
[ 1361.760110] vfs_get_super+0xf0/0x280
[ 1361.760494] vfs_get_tree+0x92/0x360
[ 1361.760871] path_mount+0x1335/0x1e40
[ 1361.761249] ? kasan_quarantine_put+0x81/0x1d0
[ 1361.761293] FAULT_INJECTION: forcing a failure.
[ 1361.761293] name failslab, interval 1, probability 0, space 0, times 0
[ 1361.761796] ? __pfx_path_mount+0x10/0x10
[ 1361.762944] ? putname+0x102/0x140
[ 1361.763287] ? kmem_cache_free+0xff/0x4a0
[ 1361.763678] ? putname+0x102/0x140
[ 1361.764038] __x64_sys_mount+0x286/0x310
[ 1361.764426] ? __pfx___x64_sys_mount+0x10/0x10
[ 1361.764890] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1361.765373] do_syscall_64+0x3f/0x90
[ 1361.765733] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1361.766202] RIP: 0033:0x7f242be6304a
[ 1361.766541] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1361.768082] RSP: 002b:00007f24293d6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1361.768767] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f242be6304a
[ 1361.769390] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1361.770016] RBP: 00007f24293d7040 R08: 00007f24293d7040 R09: 00000000200000c0
[ 1361.770635] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1361.771254] R13: 0000000020000000 R14: 00007f24293d7000 R15: 0000000020000040
[ 1361.771921]
[ 1361.772145] CPU: 0 PID: 12496 Comm: syz-executor.7 Not tainted 6.3.0-next-20230428 #1
[ 1361.772722] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1361.773294] Call Trace:
[ 1361.773488]
[ 1361.773662] dump_stack_lvl+0xc1/0xf0
[ 1361.773952] should_fail_ex+0x4b4/0x5b0
[ 1361.774264] should_failslab+0x9/0x20
[ 1361.774553] kmem_cache_alloc_lru+0x6b/0x600
[ 1361.774884] ? __d_alloc+0x31/0x9c0
[ 1361.775168] __d_alloc+0x31/0x9c0
[ 1361.775426] ? shmem_get_inode+0x6be/0xeb0
[ 1361.775752] d_make_root+0x49/0x120
[ 1361.776027] shmem_fill_super+0x7d7/0xe30
[ 1361.776337] ? __pfx_shmem_fill_super+0x10/0x10
[ 1361.776691] vfs_get_super+0xf0/0x280
[ 1361.776984] vfs_get_tree+0x92/0x360
[ 1361.777273] path_mount+0x1335/0x1e40
[ 1361.777683] ? kasan_quarantine_put+0x81/0x1d0
[ 1361.778022] ? __pfx_path_mount+0x10/0x10
[ 1361.778328] ? putname+0x102/0x140
[ 1361.778595] ? kmem_cache_free+0xff/0x4a0
[ 1361.778907] ? putname+0x102/0x140
[ 1361.779186] __x64_sys_mount+0x286/0x310
[ 1361.779494] ? __pfx___x64_sys_mount+0x10/0x10
[ 1361.779839] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1361.780234] do_syscall_64+0x3f/0x90
[ 1361.780519] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1361.780895] RIP: 0033:0x7f6ff74eb04a
[ 1361.781161] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1361.782394] RSP: 002b:00007f6ff4a5efa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1361.782923] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6ff74eb04a
[ 1361.783421] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1361.783919] RBP: 00007f6ff4a5f040 R08: 00007f6ff4a5f040 R09: 00000000200000c0
[ 1361.784418] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1361.784942] R13: 0000000020000000 R14: 00007f6ff4a5f000 R15: 0000000020000040
[ 1361.785479]
00:40:39 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
dup(r0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x10000, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r3, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:40:39 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 45)
00:40:39 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x0) (fail_nth: 2)
00:40:39 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x6001, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:40:39 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
dup(r0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x10000, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r3, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:40:39 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 51)
[ 1361.898136] FAULT_INJECTION: forcing a failure.
[ 1361.898136] name failslab, interval 1, probability 0, space 0, times 0
[ 1361.898941] CPU: 0 PID: 12539 Comm: syz-executor.4 Not tainted 6.3.0-next-20230428 #1
[ 1361.899463] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1361.900011] Call Trace:
[ 1361.900196]
[ 1361.900361] dump_stack_lvl+0xc1/0xf0
[ 1361.900658] should_fail_ex+0x4b4/0x5b0
[ 1361.900964] should_failslab+0x9/0x20
[ 1361.901253] __kmem_cache_alloc_node+0x5b/0x310
[ 1361.901588] ? alloc_super+0x52/0xb00
[ 1361.901872] kmalloc_trace+0x26/0xc0
[ 1361.902148] alloc_super+0x52/0xb00
[ 1361.902417] sget_fc+0x142/0x7a0
[ 1361.902672] ? __pfx_set_anon_super_fc+0x10/0x10
[ 1361.903021] ? __pfx_shmem_fill_super+0x10/0x10
[ 1361.903351] vfs_get_super+0x2d/0x280
[ 1361.903638] vfs_get_tree+0x92/0x360
[ 1361.903912] path_mount+0x1335/0x1e40
[ 1361.904209] ? kasan_quarantine_put+0x81/0x1d0
[ 1361.904535] ? __pfx_path_mount+0x10/0x10
[ 1361.904852] ? putname+0x102/0x140
[ 1361.905114] ? kmem_cache_free+0xff/0x4a0
[ 1361.905427] ? putname+0x102/0x140
[ 1361.905697] __x64_sys_mount+0x286/0x310
[ 1361.905991] ? __pfx___x64_sys_mount+0x10/0x10
[ 1361.906330] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1361.906714] do_syscall_64+0x3f/0x90
[ 1361.906985] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1361.907349] RIP: 0033:0x7f140720e04a
[ 1361.907615] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1361.908893] RSP: 002b:00007f1404781fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1361.909444] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f140720e04a
[ 1361.909947] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1361.910464] RBP: 00007f1404782040 R08: 00007f1404782040 R09: 00000000200000c0
[ 1361.910967] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1361.911478] R13: 0000000020000000 R14: 00007f1404782000 R15: 0000000020000040
[ 1361.912014]
00:40:40 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_timeval(r2, 0x1, 0x1b, &(0x7f0000000200), 0x10)
sendfile(r0, r2, &(0x7f0000000000)=0x9, 0x4)
r3 = fork()
ptrace$setopts(0x4206, r3, 0x0, 0x0)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
getpgid(0xffffffffffffffff)
getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@dev, @in6=@private2}}, {{@in6=@private1}, 0x0, @in6=@private2}}, &(0x7f0000000040)=0xe8)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc)
r4 = fork()
ptrace$setopts(0x4206, r4, 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
00:40:40 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
dup(r0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x10000, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r3, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:40:40 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 40)
[ 1362.058652] FAULT_INJECTION: forcing a failure.
[ 1362.058652] name failslab, interval 1, probability 0, space 0, times 0
[ 1362.059513] CPU: 0 PID: 12622 Comm: syz-executor.5 Not tainted 6.3.0-next-20230428 #1
[ 1362.060038] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1362.060610] Call Trace:
[ 1362.060795]
[ 1362.060966] dump_stack_lvl+0xc1/0xf0
[ 1362.061247] should_fail_ex+0x4b4/0x5b0
[ 1362.061550] should_failslab+0x9/0x20
[ 1362.061828] __kmem_cache_alloc_node+0x5b/0x310
[ 1362.062162] ? memcg_list_lru_alloc+0x248/0xb20
[ 1362.062513] ? memcg_list_lru_alloc+0x248/0xb20
[ 1362.062849] __kmalloc+0x4a/0x160
[ 1362.063118] memcg_list_lru_alloc+0x248/0xb20
[ 1362.063446] ? kmem_cache_alloc_lru+0xfd/0x600
[ 1362.063783] ? __pfx_memcg_list_lru_alloc+0x10/0x10
[ 1362.064192] kmem_cache_alloc_lru+0x125/0x600
[ 1362.064523] ? shmem_alloc_inode+0x27/0x50
[ 1362.064864] shmem_alloc_inode+0x27/0x50
[ 1362.065168] ? __pfx_shmem_alloc_inode+0x10/0x10
[ 1362.065514] alloc_inode+0x63/0x240
[ 1362.065783] new_inode+0x25/0x1f0
[ 1362.066042] shmem_get_inode+0x183/0xeb0
[ 1362.066360] shmem_fill_super+0x708/0xe30
[ 1362.066664] ? __pfx_shmem_fill_super+0x10/0x10
[ 1362.066995] vfs_get_super+0xf0/0x280
[ 1362.067284] vfs_get_tree+0x92/0x360
[ 1362.067577] path_mount+0x1335/0x1e40
[ 1362.067870] ? kasan_quarantine_put+0x81/0x1d0
[ 1362.068208] ? __pfx_path_mount+0x10/0x10
[ 1362.068515] ? putname+0x102/0x140
[ 1362.068800] ? kmem_cache_free+0xff/0x4a0
[ 1362.069112] ? putname+0x102/0x140
[ 1362.069385] __x64_sys_mount+0x286/0x310
[ 1362.069697] ? __pfx___x64_sys_mount+0x10/0x10
[ 1362.070035] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1362.070444] do_syscall_64+0x3f/0x90
[ 1362.070735] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1362.071121] RIP: 0033:0x7f242be6304a
[ 1362.071401] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1362.072683] RSP: 002b:00007f24293d6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1362.073240] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f242be6304a
[ 1362.073746] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1362.074276] RBP: 00007f24293d7040 R08: 00007f24293d7040 R09: 00000000200000c0
[ 1362.074799] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1362.075317] R13: 0000000020000000 R14: 00007f24293d7000 R15: 0000000020000040
[ 1362.075860]
00:40:54 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_timeval(r2, 0x1, 0x1b, &(0x7f0000000200), 0x10)
sendfile(r0, r2, &(0x7f0000000000)=0x9, 0x4)
r3 = fork()
ptrace$setopts(0x4206, r3, 0x0, 0x0)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
getpgid(0xffffffffffffffff)
getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@dev, @in6=@private2}}, {{@in6=@private1}, 0x0, @in6=@private2}}, &(0x7f0000000040)=0xe8)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc)
r4 = fork()
ptrace$setopts(0x4206, r4, 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
00:40:54 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 41)
00:40:54 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 52)
00:40:54 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 46)
00:40:54 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0xf000, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:40:54 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x0) (fail_nth: 3)
00:40:54 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
dup(r0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x10000, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r3, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:40:54 executing program 3:
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
r2 = getpid()
clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[r0, r0, r2], 0x3}, 0x58)
r3 = fork()
r4 = getpgid(r3)
syz_open_procfs(r4, &(0x7f0000000000)='sessionid\x00')
sched_rr_get_interval(r4, &(0x7f0000000040))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0))
open(&(0x7f00000015c0)='./file1\x00', 0x28000, 0x40)
fcntl$getown(r1, 0x9)
[ 1376.357952] FAULT_INJECTION: forcing a failure.
[ 1376.357952] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1376.358828] CPU: 1 PID: 12638 Comm: syz-executor.0 Not tainted 6.3.0-next-20230428 #1
[ 1376.359352] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1376.359935] Call Trace:
[ 1376.360120]
[ 1376.360288] dump_stack_lvl+0xc1/0xf0
[ 1376.360562] should_fail_ex+0x4b4/0x5b0
[ 1376.360881] strncpy_from_user+0x38/0x3f0
[ 1376.361179] getname_flags.part.0+0x95/0x4f0
[ 1376.361514] ? rcu_read_lock_any_held+0x79/0xa0
[ 1376.361852] getname+0x92/0xe0
[ 1376.362102] do_sys_openat2+0xf9/0x4c0
[ 1376.362391] ? __pfx_do_sys_openat2+0x10/0x10
[ 1376.362742] __x64_sys_openat+0x143/0x200
[ 1376.363039] ? __pfx___x64_sys_openat+0x10/0x10
[ 1376.363394] ? ksys_write+0x1a7/0x260
[ 1376.363664] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1376.364052] do_syscall_64+0x3f/0x90
[ 1376.364317] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1376.364700] RIP: 0033:0x7f66595d6b19
[ 1376.364968] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1376.366227] RSP: 002b:00007f6656b4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[ 1376.366734] RAX: ffffffffffffffda RBX: 00007f66596e9f60 RCX: 00007f66595d6b19
[ 1376.367225] RDX: 0000000000000840 RSI: 0000000020000080 RDI: ffffffffffffff9c
[ 1376.367695] RBP: 00007f6656b4c1d0 R08: 0000000000000000 R09: 0000000000000000
[ 1376.368177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 1376.368677] R13: 00007fffe152e69f R14: 00007f6656b4c300 R15: 0000000000022000
[ 1376.369212]
00:40:54 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x34000, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
[ 1376.414614] FAULT_INJECTION: forcing a failure.
[ 1376.414614] name failslab, interval 1, probability 0, space 0, times 0
[ 1376.415992] CPU: 0 PID: 12645 Comm: syz-executor.7 Not tainted 6.3.0-next-20230428 #1
[ 1376.416910] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1376.417838] Call Trace:
[ 1376.418179]
[ 1376.418468] dump_stack_lvl+0xc1/0xf0
[ 1376.418992] should_fail_ex+0x4b4/0x5b0
[ 1376.419555] should_failslab+0x9/0x20
[ 1376.420077] __kmem_cache_alloc_node+0x5b/0x310
[ 1376.420706] ? memcg_list_lru_alloc+0x518/0xb20
[ 1376.421362] ? memcg_list_lru_alloc+0x518/0xb20
[ 1376.421979] __kmalloc+0x4a/0x160
[ 1376.422466] memcg_list_lru_alloc+0x518/0xb20
[ 1376.423085] ? kmem_cache_alloc_lru+0xfd/0x600
[ 1376.423712] ? __pfx_memcg_list_lru_alloc+0x10/0x10
[ 1376.424376] kmem_cache_alloc_lru+0x125/0x600
[ 1376.424937] ? __d_alloc+0x31/0x9c0
[ 1376.425453] __d_alloc+0x31/0x9c0
[ 1376.425888] ? shmem_get_inode+0x6be/0xeb0
[ 1376.426477] d_make_root+0x49/0x120
[ 1376.426980] shmem_fill_super+0x7d7/0xe30
[ 1376.427546] ? __pfx_shmem_fill_super+0x10/0x10
[ 1376.428165] vfs_get_super+0xf0/0x280
[ 1376.428687] vfs_get_tree+0x92/0x360
[ 1376.429209] path_mount+0x1335/0x1e40
[ 1376.429764] ? kasan_quarantine_put+0x81/0x1d0
[ 1376.430334] ? __pfx_path_mount+0x10/0x10
[ 1376.430898] ? putname+0x102/0x140
[ 1376.431389] ? kmem_cache_free+0xff/0x4a0
[ 1376.431961] ? putname+0x102/0x140
[ 1376.432477] __x64_sys_mount+0x286/0x310
[ 1376.433054] ? __pfx___x64_sys_mount+0x10/0x10
[ 1376.433699] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1376.434423] do_syscall_64+0x3f/0x90
[ 1376.434936] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1376.435621] RIP: 0033:0x7f6ff74eb04a
[ 1376.436111] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1376.438386] RSP: 002b:00007f6ff4a5efa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1376.439369] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6ff74eb04a
[ 1376.440280] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1376.441206] RBP: 00007f6ff4a5f040 R08: 00007f6ff4a5f040 R09: 00000000200000c0
[ 1376.442100] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1376.443004] R13: 0000000020000000 R14: 00007f6ff4a5f000 R15: 0000000020000040
[ 1376.443956]
00:40:54 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x80000, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:40:54 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x0) (fail_nth: 4)
[ 1376.477329] FAULT_INJECTION: forcing a failure.
[ 1376.477329] name failslab, interval 1, probability 0, space 0, times 0
[ 1376.478165] CPU: 1 PID: 12736 Comm: syz-executor.0 Not tainted 6.3.0-next-20230428 #1
[ 1376.478727] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1376.479305] Call Trace:
[ 1376.479493]
[ 1376.479671] dump_stack_lvl+0xc1/0xf0
[ 1376.479961] should_fail_ex+0x4b4/0x5b0
[ 1376.480268] ? __alloc_file+0x21/0x240
[ 1376.480560] should_failslab+0x9/0x20
[ 1376.480854] kmem_cache_alloc+0x5a/0x390
[ 1376.481161] __alloc_file+0x21/0x240
[ 1376.481442] alloc_empty_file+0x71/0x190
[ 1376.481742] path_openat+0xd8/0x2750
[ 1376.482022] ? __pfx_path_openat+0x10/0x10
[ 1376.482329] ? __pfx_perf_trace_lock_acquire+0x10/0x10
[ 1376.482708] do_filp_open+0x1ba/0x410
[ 1376.482985] ? __pfx_do_filp_open+0x10/0x10
[ 1376.483297] ? expand_files+0x446/0x8e0
[ 1376.483592] ? find_held_lock+0x2c/0x110
[ 1376.483894] ? alloc_fd+0x2eb/0x760
[ 1376.484166] ? lock_release+0x1e3/0x680
[ 1376.484463] ? do_raw_spin_lock+0x125/0x270
[ 1376.484786] ? __pfx_do_raw_spin_lock+0x10/0x10
[ 1376.485135] ? _raw_spin_unlock+0x1e/0x40
[ 1376.485443] ? alloc_fd+0x2eb/0x760
[ 1376.485724] do_sys_openat2+0x171/0x4c0
[ 1376.486021] ? __pfx_do_sys_openat2+0x10/0x10
[ 1376.486364] __x64_sys_openat+0x143/0x200
[ 1376.486674] ? __pfx___x64_sys_openat+0x10/0x10
[ 1376.487019] ? ksys_write+0x1a7/0x260
[ 1376.487303] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1376.487680] do_syscall_64+0x3f/0x90
[ 1376.487956] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1376.488329] RIP: 0033:0x7f66595d6b19
[ 1376.488590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1376.489860] RSP: 002b:00007f6656b4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[ 1376.490393] RAX: ffffffffffffffda RBX: 00007f66596e9f60 RCX: 00007f66595d6b19
[ 1376.490894] RDX: 0000000000000840 RSI: 0000000020000080 RDI: ffffffffffffff9c
[ 1376.491399] RBP: 00007f6656b4c1d0 R08: 0000000000000000 R09: 0000000000000000
[ 1376.491889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 1376.492385] R13: 00007fffe152e69f R14: 00007f6656b4c300 R15: 0000000000022000
[ 1376.492902]
00:40:54 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 42)
00:40:54 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 47)
00:40:54 executing program 3:
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
r2 = getpid()
clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[r0, r0, r2], 0x3}, 0x58)
r3 = fork()
r4 = getpgid(r3)
syz_open_procfs(r4, &(0x7f0000000000)='sessionid\x00')
sched_rr_get_interval(r4, &(0x7f0000000040))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0))
open(&(0x7f00000015c0)='./file1\x00', 0x28000, 0x40)
fcntl$getown(r1, 0x9)
00:40:54 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
dup(r0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x10000, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r3, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:40:54 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x400300, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:41:07 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 43)
00:41:07 executing program 3:
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
r2 = getpid()
clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[r0, r0, r2], 0x3}, 0x58)
r3 = fork()
r4 = getpgid(r3)
syz_open_procfs(r4, &(0x7f0000000000)='sessionid\x00')
sched_rr_get_interval(r4, &(0x7f0000000040))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0))
open(&(0x7f00000015c0)='./file1\x00', 0x28000, 0x40)
fcntl$getown(r1, 0x9)
00:41:07 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0xf0ffff, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:41:07 executing program 2:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0)
write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="389f6242971b64d244893808946a70c2eb4745163f8940fd9b780a9bca81b2e43f43712a968d432f07ab45ded42535a9e239e0d2765beb9aaef9674b0dcba36959010a233e4f74a87b7cb58c260ec7ee82ac7f5ab078c8d8a50181"], 0xb)
r2 = accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14)
ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x8, 0x200}}, './file1\x00'})
sendfile(r2, r3, &(0x7f00000001c0)=0x2, 0x88f0)
fallocate(0xffffffffffffffff, 0x10, 0x0, 0x7000)
openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/partitions\x00', 0x0, 0x0)
write(r0, &(0x7f0000000080)="01", 0x41030)
00:41:07 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 53)
00:41:07 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x0) (fail_nth: 5)
00:41:07 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 48)
00:41:07 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
dup(r0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x10000, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r3, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:41:07 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x0) (fail_nth: 6)
00:41:07 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x1000000, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:41:07 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
dup(r0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x10000, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r3, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:41:07 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 49)
00:41:07 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 44)
00:41:07 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 54)
[ 1389.415982] FAULT_INJECTION: forcing a failure.
[ 1389.415982] name failslab, interval 1, probability 0, space 0, times 0
[ 1389.422454] CPU: 0 PID: 12890 Comm: syz-executor.0 Not tainted 6.3.0-next-20230428 #1
[ 1389.423289] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1389.424152] Call Trace:
[ 1389.424449]
[ 1389.424703] dump_stack_lvl+0xc1/0xf0
[ 1389.425172] should_fail_ex+0x4b4/0x5b0
[ 1389.425618] ? security_file_alloc+0x38/0x170
[ 1389.426077] should_failslab+0x9/0x20
[ 1389.426506] kmem_cache_alloc+0x5a/0x390
[ 1389.426969] security_file_alloc+0x38/0x170
[ 1389.427457] __alloc_file+0xb6/0x240
[ 1389.427910] alloc_empty_file+0x71/0x190
[ 1389.428391] path_openat+0xd8/0x2750
[ 1389.428820] ? __pfx_path_openat+0x10/0x10
[ 1389.429299] ? __pfx_perf_trace_lock_acquire+0x10/0x10
[ 1389.429908] do_filp_open+0x1ba/0x410
[ 1389.430314] ? __pfx_do_filp_open+0x10/0x10
[ 1389.430723] ? expand_files+0x446/0x8e0
[ 1389.431042] ? find_held_lock+0x2c/0x110
[ 1389.431355] ? alloc_fd+0x2eb/0x760
[ 1389.431650] ? lock_release+0x1e3/0x680
[ 1389.431980] ? do_raw_spin_lock+0x125/0x270
[ 1389.432320] ? __pfx_do_raw_spin_lock+0x10/0x10
[ 1389.432695] ? _raw_spin_unlock+0x1e/0x40
[ 1389.433062] ? alloc_fd+0x2eb/0x760
[ 1389.433352] do_sys_openat2+0x171/0x4c0
[ 1389.433691] ? __pfx_do_sys_openat2+0x10/0x10
[ 1389.434069] __x64_sys_openat+0x143/0x200
[ 1389.434418] ? __pfx___x64_sys_openat+0x10/0x10
[ 1389.434807] ? ksys_write+0x1a7/0x260
[ 1389.435119] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1389.435546] do_syscall_64+0x3f/0x90
[ 1389.435857] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1389.436239] RIP: 0033:0x7f66595d6b19
[ 1389.436495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1389.437688] RSP: 002b:00007f6656b4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[ 1389.438279] RAX: ffffffffffffffda RBX: 00007f66596e9f60 RCX: 00007f66595d6b19
[ 1389.438806] RDX: 0000000000000840 RSI: 0000000020000080 RDI: ffffffffffffff9c
[ 1389.439344] RBP: 00007f6656b4c1d0 R08: 0000000000000000 R09: 0000000000000000
[ 1389.439864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 1389.440389] R13: 00007fffe152e69f R14: 00007f6656b4c300 R15: 0000000000022000
[ 1389.440927]
00:41:07 executing program 2:
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2000005, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
r1 = socket$inet6_udplite(0xa, 0x2, 0x88)
r2 = socket$packet(0x11, 0x3, 0x300)
ioctl$FS_IOC_READ_VERITY_METADATA(r1, 0xc0286687, &(0x7f0000000800)={0x3, 0xff, 0xca, &(0x7f0000000700)=""/202})
r3 = socket$nl_sock_diag(0x10, 0x3, 0x4)
r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x450803, 0x70)
sendmsg$SOCK_DIAG_BY_FAMILY(r4, &(0x7f0000001a00)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x14101008}, 0xc, &(0x7f00000006c0)={&(0x7f0000004340)={0x13fc, 0x14, 0xc04, 0x70bd29, 0x25dfdbfc, {0x9, 0x4}, [@INET_DIAG_REQ_BYTECODE={0x92, 0x1, "f080e18c78597e740e0eff36e8f2580c1245a0f351595e87e29cd8409ad03bd8af53018a2aeac6c303e1009d6389f1fe9ece20282383708044e299c879c26578817431dc7b6df508d3dcefee9932fbf181fc49cf991803aede57cad13aabbb67303e0cad0762a4ae4361c32a6e0697f56a2a037a9a3f92b48942135480d49f00"/142}, @INET_DIAG_REQ_BYTECODE={0xc2, 0x1, "0993458f2720bf8f63144b18826a31d995e2fd120444fff766464ab8d364d93170ecf58f7b1529b04e8c5376e3355fe3ef6d5456a69fd580fcb9627412f7381a45db4cc884f71ed18089eb1aaeff945c2ae9a926525defdc787da58dc3a5be167c36085c4b898edf3a6a545aa5a100b51ae0e2701ef66d911cce19d1daaac9bd0ccb7dde68fa457885644326fef483af3a80f48d3593e195cf7f56caaf16bdef114e91895c8278cbd6fa2eaa7f83f2236a9a5db8e9d67d2d0a2196e4f03d"}, @INET_DIAG_REQ_BYTECODE={0xe, 0x1, "eb83e9688f1e08289379"}, @INET_DIAG_REQ_BYTECODE={0xdc, 0x1, "9450d76f972af2c6dd5c23dea3bdd4b1fecceefd411d8848ea948fe5e5eba20e1d5a61d1257d9388be971e475ea680d1a5768fdc871ea275e6fc6e32292d52ce563179be2d719736c6bcdcbd872a230e4fc8687bbbf03d815542390e485767b77c083286ff1c826265d53d2f8bccc834bb31112c267e68e318fa7372c490983de600cb197b97c189ca58139dc58bed4ff43d53c78488ddb27a7e85d37fd70c70dd9d4b599f02bd4551f2bbfe17683279b71011d1396df50187009724bc052ba1135e129da46d29f9231f4a237ab054145a424b08157baa08"}, @INET_DIAG_REQ_BYTECODE={0x101, 0x1, "217cce02d12e2f89bce03a628892c1207a1fb7e68362f9d96647c6dcb6e27f3f20f81eaef9d50e1df2f3068a96db4a6113ad2ed96c5eb53888eeabef3e6501ea75a2406ffa59e99044d310662f5323db1738dbaa63734ec7938305a9831ba19525b72353d7b01bb4d083ffd364f5f67470c1ace1823a7c25bc082126c7a5e28a22cdfae762fc6a80f0ab7e285a31dd2d3f3a2023cc0cde0b841cd1fe5e783a0734a3927ef6d6c76b22f5d04bad839ee95b97df9a5c3ed91fcb27ce877324684d20a52061e675c5a1b43792f2440e368bf06dc94563dfb27187c9b7df8d0f7da92cca71cac5c93f5306f24668d173bc2100"/253}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x8a, 0x1, "0b95000cfc686aa99b31bf01b556e2219b91d5a1c7eb1739ec5f750a307d7d36b28a6b5842305fcfe00e9803e612d41367643ecc18d1d00e9c14fd0d1a73b134222c645f7ccf421e402a658bb8181e6831e4f030855dbd5f2ffb75e68577849309e2ef8eb7ece574dcb5a0a90234b6fa0372fa0200000000000000aa7a7cff592ebd6a869212"}, @INET_DIAG_REQ_BYTECODE={0xf, 0x1, "323ff822428a37c1984544"}]}, 0x13fc}, 0x1, 0x0, 0x0, 0x20004800}, 0x4000004)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0})
setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000000)={r5, 0x2, 0x6, @link_local}, 0x10)
ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={@local, 0x3b, r5})
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000100)=@polexpire={0x3e0, 0x1b, 0x300, 0x70bd28, 0x25dfdbfc, {{{@in=@empty, @in6=@empty, 0x4e24, 0x0, 0x4e20, 0x0, 0xa, 0xe0, 0x0, 0x2b, r5, 0xee00}, {0x40eb, 0x0, 0x8001, 0x9, 0x169ae268, 0x7, 0x36, 0x2a}, {0x8, 0x8, 0x1, 0x1}, 0x1ff, 0x6e6bbb, 0x0, 0x0, 0x0, 0x2}, 0x3}, [@algo_crypt={0xf0, 0x2, {{'adiantum(xts-aes-aesni,sm4-generic,sha224-generic)\x00'}, 0x540, "d617529267471dc26080477da1d4fc61f9ecda88e80dd9b5d6c5f3587fb5cc4f5281ea06881dec2a7dcdd548618c6c4c0cd3499b922386ee86fa1693a58451a1c8013f545587b606671a5d0124e47edb8fb66314bc0ea59af56806a6e38405b5879122258d930654741600d1538b24053e83b802f99e90cb30eebaad50a3acb3837ad573965471e0ec31d3f5b18f047d122ca2e8c9447a457a142fd28eddc11f98e9a114e0034b78"}}, @proto={0x5, 0x19, 0x3c}, @algo_auth_trunc={0x144, 0x14, {{'sha512\x00'}, 0x7c0, 0x60, "f7f80e0e2df657c8e8cc066f45fd8f1158cef5f12d0a47de8409b520d1a474442364268f82f4d428ed2c45050a69da61306d8eb44c25aa593b2d36b2727c95402cce4e67a29cbfa9967037bcfefc528aca9c385db88b88feb800573a18a4a0b65ec3b5e8e0194f57a9a11d4ad07778eb019b22a7ffd8015d51f61d14944d06e038c7a3db82c99c9694b7f90dd7a3b83f2e27b47bd090e95349d81a247bde62b07976cd9cab92aecba20c9c0a0dd46738d0674ef8b72a6eed78ba05cc4b42ae5f83822f7e9f2605e420d82b39795588f6f256adfc5feb76a83afcf9d07c1ba693738238df491e99bd287b2efa66ac5174c7332b549b338c89"}}, @sa={0xe4, 0x6, {{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x8, 0x4e23, 0x4, 0xa, 0x20, 0x80, 0xc, 0x0, 0xffffffffffffffff}, {@in6=@empty, 0x4d3, 0x3c}, @in=@multicast2, {0x0, 0x71, 0x9, 0x0, 0x548, 0x0, 0x8, 0xff}, {0x5b8, 0x800, 0x8000, 0xee}, {0xf0, 0xffff, 0x3}, 0x70bd2c, 0x34ff, 0xa, 0x4, 0x7, 0xf2}}]}, 0x3e0}, 0x1, 0x0, 0x0, 0x2000004}, 0x24004840)
fremovexattr(r0, &(0x7f0000001a40)=ANY=[@ANYBLOB="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"])
ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f0000000040))
r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000005c0), 0xffffffffffffffff)
sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x24, r6, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x40004}, 0x4000004)
00:41:07 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 45)
00:41:07 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
dup(r0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x10000, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r3, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:41:21 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 50)
00:41:21 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x2000000, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:41:21 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x0) (fail_nth: 7)
00:41:21 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
dup(r0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x10000, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r3, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:41:21 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = creat(0x0, 0x0)
statx(0xffffffffffffff9c, 0x0, 0x1000, 0x4, &(0x7f0000000100))
r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'})
fcntl$getownex(r2, 0x10, 0x0)
r3 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x78, 0x0, &(0x7f0000000380)=[@transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000300)={@fda={0x66646185, 0x3, 0x2, 0x29}, @fd={0x66642a85, 0x0, r3}, @fda={0x66646185, 0x3, 0x1, 0x32}}, &(0x7f0000000040)={0x0, 0x20, 0x38}}}, @increfs={0x40046304, 0x3}, @acquire_done, @clear_death={0x400c630f, 0x3}, @release={0x40046306, 0x3}], 0x0, 0x0, &(0x7f0000000240)})
r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwritev(r4, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000200)={0x0, 0x0, r1, 0x80, 0x80000})
r5 = fork()
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1)
ptrace$setopts(0xffffffffffffffff, r5, 0x0, 0x0)
getpid()
00:41:21 executing program 3:
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
r2 = getpid()
clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[r0, r0, r2], 0x3}, 0x58)
r3 = fork()
r4 = getpgid(r3)
syz_open_procfs(r4, &(0x7f0000000000)='sessionid\x00')
sched_rr_get_interval(r4, &(0x7f0000000040))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0))
open(&(0x7f00000015c0)='./file1\x00', 0x28000, 0x40)
fcntl$getown(r1, 0x9)
00:41:21 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 46)
00:41:21 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 55)
00:41:21 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 47)
00:41:21 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x0) (fail_nth: 8)
00:41:21 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x3000000, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:41:21 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 56)
[ 1403.711859] FAULT_INJECTION: forcing a failure.
[ 1403.711859] name failslab, interval 1, probability 0, space 0, times 0
[ 1403.712656] CPU: 0 PID: 13035 Comm: syz-executor.0 Not tainted 6.3.0-next-20230428 #1
[ 1403.713294] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1403.713964] Call Trace:
[ 1403.714192]
[ 1403.714391] dump_stack_lvl+0xc1/0xf0
[ 1403.714731] should_fail_ex+0x4b4/0x5b0
[ 1403.715083] should_failslab+0x9/0x20
[ 1403.715424] __kmem_cache_alloc_node+0x5b/0x310
[ 1403.715832] ? proc_self_get_link+0x18f/0x200
[ 1403.716213] ? lock_is_held_type+0x9f/0x120
[ 1403.716590] kmalloc_trace+0x26/0xc0
[ 1403.716914] proc_self_get_link+0x18f/0x200
[ 1403.717290] ? __pfx_proc_self_get_link+0x10/0x10
[ 1403.717694] step_into+0x185a/0x2000
[ 1403.717940] ? selinux_inode_permission+0x3de/0x5e0
[ 1403.718367] ? lock_is_held_type+0x9f/0x120
[ 1403.718731] ? __pfx_step_into+0x10/0x10
[ 1403.719092] walk_component+0xf5/0x5b0
[ 1403.719421] link_path_walk.part.0+0x76e/0xd90
[ 1403.719817] ? __pfx_link_path_walk.part.0+0x10/0x10
[ 1403.720241] path_openat+0x24e/0x2750
[ 1403.720590] ? __pfx_path_openat+0x10/0x10
[ 1403.720951] ? __pfx_perf_trace_lock_acquire+0x10/0x10
[ 1403.721312] do_filp_open+0x1ba/0x410
[ 1403.721637] ? __pfx_do_filp_open+0x10/0x10
[ 1403.722004] ? expand_files+0x446/0x8e0
[ 1403.722347] ? find_held_lock+0x2c/0x110
[ 1403.722727] ? _raw_spin_unlock+0x1e/0x40
[ 1403.723080] ? alloc_fd+0x2eb/0x760
[ 1403.723409] do_sys_openat2+0x171/0x4c0
[ 1403.723765] ? __pfx_do_sys_openat2+0x10/0x10
[ 1403.724161] __x64_sys_openat+0x143/0x200
[ 1403.724440] ? __pfx___x64_sys_openat+0x10/0x10
[ 1403.724845] ? ksys_write+0x1a7/0x260
[ 1403.725118] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1403.725557] do_syscall_64+0x3f/0x90
[ 1403.725809] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1403.726247] RIP: 0033:0x7f66595d6b19
[ 1403.726492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1403.727945] RSP: 002b:00007f6656b4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[ 1403.728428] RAX: ffffffffffffffda RBX: 00007f66596e9f60 RCX: 00007f66595d6b19
[ 1403.729018] RDX: 0000000000000840 RSI: 0000000020000080 RDI: ffffffffffffff9c
[ 1403.729629] RBP: 00007f6656b4c1d0 R08: 0000000000000000 R09: 0000000000000000
[ 1403.730217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 1403.730805] R13: 00007fffe152e69f R14: 00007f6656b4c300 R15: 0000000000022000
[ 1403.731419]
00:41:21 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 48)
00:41:21 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
dup(r0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r4, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
[ 1403.800910] FAULT_INJECTION: forcing a failure.
[ 1403.800910] name failslab, interval 1, probability 0, space 0, times 0
[ 1403.801803] CPU: 0 PID: 13070 Comm: syz-executor.5 Not tainted 6.3.0-next-20230428 #1
[ 1403.802447] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1403.803125] Call Trace:
[ 1403.803356]
[ 1403.803561] dump_stack_lvl+0xc1/0xf0
[ 1403.803913] should_fail_ex+0x4b4/0x5b0
[ 1403.804288] ? security_inode_alloc+0x38/0x160
[ 1403.804688] should_failslab+0x9/0x20
[ 1403.805033] kmem_cache_alloc+0x5a/0x390
[ 1403.805410] security_inode_alloc+0x38/0x160
[ 1403.805814] inode_init_always+0xbb2/0xea0
[ 1403.806196] alloc_inode+0x84/0x240
[ 1403.806515] new_inode+0x25/0x1f0
[ 1403.806832] shmem_get_inode+0x183/0xeb0
[ 1403.807211] shmem_fill_super+0x708/0xe30
[ 1403.807518] ? __pfx_shmem_fill_super+0x10/0x10
[ 1403.807915] vfs_get_super+0xf0/0x280
[ 1403.808264] vfs_get_tree+0x92/0x360
[ 1403.808602] path_mount+0x1335/0x1e40
[ 1403.808957] ? kasan_quarantine_put+0x81/0x1d0
[ 1403.809380] ? __pfx_path_mount+0x10/0x10
[ 1403.809755] ? putname+0x102/0x140
[ 1403.810075] ? kmem_cache_free+0xff/0x4a0
[ 1403.810447] ? putname+0x102/0x140
[ 1403.810787] __x64_sys_mount+0x286/0x310
[ 1403.811147] ? __pfx___x64_sys_mount+0x10/0x10
[ 1403.811562] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1403.812027] do_syscall_64+0x3f/0x90
[ 1403.812364] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1403.812808] RIP: 0033:0x7f242be6304a
[ 1403.813138] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1403.814634] RSP: 002b:00007f24293d6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1403.815261] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f242be6304a
[ 1403.815856] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1403.816458] RBP: 00007f24293d7040 R08: 00007f24293d7040 R09: 00000000200000c0
[ 1403.817057] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1403.817654] R13: 0000000020000000 R14: 00007f24293d7000 R15: 0000000020000040
[ 1403.818290]
00:41:34 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x0) (fail_nth: 9)
00:41:34 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_timeval(r0, 0x1, 0x1b, &(0x7f0000000200), 0x10)
ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000001c0)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0c5e45fe0f4655f000000000000040004", 0x1d, 0x2100}, {0x0, 0x0, 0xfffffffffffffffe}], 0x1, &(0x7f0000012c00))
00:41:34 executing program 3:
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
r2 = getpid()
clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[r0, r0, r2], 0x3}, 0x58)
r3 = fork()
r4 = getpgid(r3)
syz_open_procfs(r4, &(0x7f0000000000)='sessionid\x00')
sched_rr_get_interval(r4, &(0x7f0000000040))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0))
open(&(0x7f00000015c0)='./file1\x00', 0x28000, 0x40)
fcntl$getown(r1, 0x9)
00:41:34 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 57)
00:41:34 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
dup(r0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r4, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:41:34 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 49)
00:41:34 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 51)
00:41:34 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x4000000, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:41:34 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x0) (fail_nth: 10)
00:41:34 executing program 2:
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340))
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xb)
ioctl$TIOCSIG(r0, 0x40045436, 0x9)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000380)={0x0, 0x0, "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", "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"})
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000587c0)={0xffffffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "2c0a66e365e42f"})
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000597c0)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "3e3b3204ece552"})
ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0xd46, 0x3ff, 0xfff, 0x1, 0xc, "c8e131ee2bbb54c1"})
r5 = socket$inet_udp(0x2, 0x2, 0x0)
dup3(r0, r5, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4c4}, 0x0, 0x100000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$F2FS_IOC_SET_PIN_FILE(0xffffffffffffffff, 0x4004f50d, &(0x7f0000000140)=0x1)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000000640)=ANY=[])
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0)
r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0)
pread64(r6, &(0x7f00000002c0)=""/4096, 0x1000, 0x47be)
socket$inet6_udp(0xa, 0x2, 0x0)
[ 1416.939916] FAULT_INJECTION: forcing a failure.
[ 1416.939916] name failslab, interval 1, probability 0, space 0, times 0
[ 1416.940733] CPU: 1 PID: 13164 Comm: syz-executor.7 Not tainted 6.3.0-next-20230428 #1
[ 1416.941269] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1416.941811] Call Trace:
[ 1416.941994]
[ 1416.942157] dump_stack_lvl+0xc1/0xf0
[ 1416.942433] should_fail_ex+0x4b4/0x5b0
[ 1416.942720] ? alloc_vfsmnt+0x23/0x6c0
[ 1416.942994] should_failslab+0x9/0x20
[ 1416.943270] kmem_cache_alloc+0x5a/0x390
[ 1416.943563] alloc_vfsmnt+0x23/0x6c0
[ 1416.943826] vfs_create_mount+0x8f/0x490
[ 1416.944113] path_mount+0x149b/0x1e40
[ 1416.944394] ? kasan_quarantine_put+0x81/0x1d0
[ 1416.944699] ? __pfx_path_mount+0x10/0x10
[ 1416.944993] ? putname+0x102/0x140
[ 1416.945263] ? kmem_cache_free+0xff/0x4a0
[ 1416.945564] ? putname+0x102/0x140
[ 1416.945823] __x64_sys_mount+0x286/0x310
[ 1416.946112] ? __pfx___x64_sys_mount+0x10/0x10
[ 1416.946441] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1416.946808] do_syscall_64+0x3f/0x90
[ 1416.947074] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1416.947427] RIP: 0033:0x7f6ff74eb04a
[ 1416.947666] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1416.948376] FAULT_INJECTION: forcing a failure.
[ 1416.948376] name failslab, interval 1, probability 0, space 0, times 0
[ 1416.948842] RSP: 002b:00007f6ff4a5efa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1416.948862] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6ff74eb04a
[ 1416.948874] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1416.948886] RBP: 00007f6ff4a5f040 R08: 00007f6ff4a5f040 R09: 00000000200000c0
[ 1416.952110] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1416.952551] R13: 0000000020000000 R14: 00007f6ff4a5f000 R15: 0000000020000040
[ 1416.953004]
[ 1416.953159] CPU: 0 PID: 13166 Comm: syz-executor.5 Not tainted 6.3.0-next-20230428 #1
[ 1416.954172] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1416.955182] Call Trace:
[ 1416.955527]
[ 1416.955836] dump_stack_lvl+0xc1/0xf0
[ 1416.956350] should_fail_ex+0x4b4/0x5b0
[ 1416.956910] ? security_inode_alloc+0x38/0x160
[ 1416.957553] should_failslab+0x9/0x20
[ 1416.958072] kmem_cache_alloc+0x5a/0x390
[ 1416.958629] security_inode_alloc+0x38/0x160
[ 1416.959225] inode_init_always+0xbb2/0xea0
[ 1416.959803] alloc_inode+0x84/0x240
[ 1416.960288] new_inode+0x25/0x1f0
[ 1416.960774] shmem_get_inode+0x183/0xeb0
[ 1416.961366] shmem_fill_super+0x708/0xe30
[ 1416.961922] ? __pfx_shmem_fill_super+0x10/0x10
[ 1416.962526] vfs_get_super+0xf0/0x280
[ 1416.963049] vfs_get_tree+0x92/0x360
[ 1416.963568] path_mount+0x1335/0x1e40
[ 1416.964101] ? kasan_quarantine_put+0x81/0x1d0
[ 1416.964707] ? __pfx_path_mount+0x10/0x10
[ 1416.965263] ? putname+0x102/0x140
[ 1416.965758] ? kmem_cache_free+0xff/0x4a0
[ 1416.966314] ? putname+0x102/0x140
[ 1416.966934] __x64_sys_mount+0x286/0x310
[ 1416.967631] ? __pfx___x64_sys_mount+0x10/0x10
[ 1416.968393] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1416.969260] do_syscall_64+0x3f/0x90
[ 1416.969886] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1416.970713] RIP: 0033:0x7f242be6304a
[ 1416.971312] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1416.973503] RSP: 002b:00007f24293d6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1416.974615] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f242be6304a
[ 1416.975441] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1416.976257] RBP: 00007f24293d7040 R08: 00007f24293d7040 R09: 00000000200000c0
[ 1416.977079] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1416.977906] R13: 0000000020000000 R14: 00007f24293d7000 R15: 0000000020000040
[ 1416.978779]
[ 1416.982345] FAULT_INJECTION: forcing a failure.
[ 1416.982345] name failslab, interval 1, probability 0, space 0, times 0
[ 1416.984012] CPU: 0 PID: 13168 Comm: syz-executor.0 Not tainted 6.3.0-next-20230428 #1
[ 1416.984947] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1416.985946] Call Trace:
[ 1416.986282]
[ 1416.986581] dump_stack_lvl+0xc1/0xf0
[ 1416.987084] should_fail_ex+0x4b4/0x5b0
[ 1416.987632] should_failslab+0x9/0x20
[ 1416.988131] kmem_cache_alloc_lru+0x6b/0x600
[ 1416.988700] ? __d_alloc+0x31/0x9c0
[ 1416.989184] __d_alloc+0x31/0x9c0
[ 1416.989667] d_alloc_parallel+0x10e/0x1640
[ 1416.990212] ? __d_lookup+0x247/0x4a0
[ 1416.990716] ? lock_release+0x1e3/0x680
[ 1416.991238] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 1416.991992] ? __pfx_d_alloc_parallel+0x10/0x10
[ 1416.992614] ? lock_is_held_type+0x9f/0x120
[ 1416.993170] ? __d_lookup+0x269/0x4a0
[ 1416.993692] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1416.994365] lookup_open.isra.0+0x912/0x1400
[ 1416.994939] ? __pfx_lookup_open.isra.0+0x10/0x10
[ 1416.995585] ? __pfx_down_write+0x10/0x10
[ 1416.996109] ? __mnt_want_write+0x1f4/0x2e0
[ 1416.996686] path_openat+0x97c/0x2750
[ 1416.997195] ? __pfx_path_openat+0x10/0x10
[ 1416.997744] ? __pfx_perf_trace_lock_acquire+0x10/0x10
[ 1416.998426] do_filp_open+0x1ba/0x410
[ 1416.998923] ? __pfx_do_filp_open+0x10/0x10
[ 1416.999467] ? expand_files+0x446/0x8e0
[ 1416.999989] ? find_held_lock+0x2c/0x110
00:41:35 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 52)
[ 1417.000539] ? __pfx_kfree_link+0x10/0x10
[ 1417.001204] ? _raw_spin_unlock+0x1e/0x40
[ 1417.001773] ? alloc_fd+0x2eb/0x760
[ 1417.002279] do_sys_openat2+0x171/0x4c0
[ 1417.002817] ? __pfx_do_sys_openat2+0x10/0x10
[ 1417.003425] __x64_sys_openat+0x143/0x200
[ 1417.003974] ? __pfx___x64_sys_openat+0x10/0x10
[ 1417.004582] ? ksys_write+0x1a7/0x260
[ 1417.005088] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1417.005769] do_syscall_64+0x3f/0x90
[ 1417.006249] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1417.006900] RIP: 0033:0x7f66595d6b19
[ 1417.007372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1417.009569] RSP: 002b:00007f6656b4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[ 1417.010433] RAX: ffffffffffffffda RBX: 00007f66596e9f60 RCX: 00007f66595d6b19
[ 1417.011243] RDX: 0000000000000840 RSI: 0000000020000080 RDI: ffffffffffffff9c
[ 1417.012081] RBP: 00007f6656b4c1d0 R08: 0000000000000000 R09: 0000000000000000
[ 1417.012940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 1417.013803] R13: 00007fffe152e69f R14: 00007f6656b4c300 R15: 0000000000022000
[ 1417.014671]
00:41:35 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r3, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:41:35 executing program 2:
r0 = pidfd_open(0x0, 0x0)
r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0xd7103, 0x0)
write$rfkill(r1, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x1}, 0x8)
r2 = fork()
ptrace$setopts(0x4206, r2, 0x7ff, 0x2)
getpgid(r2)
ptrace(0x8, r2)
fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r2})
00:41:35 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 58)
00:41:35 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x5000000, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:41:35 executing program 3:
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
r2 = getpid()
clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[r0, r0, r2], 0x3}, 0x58)
r3 = fork()
r4 = getpgid(r3)
syz_open_procfs(r4, &(0x7f0000000000)='sessionid\x00')
sched_rr_get_interval(r4, &(0x7f0000000040))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0))
open(&(0x7f00000015c0)='./file1\x00', 0x28000, 0x40)
fcntl$getown(r1, 0x9)
00:41:35 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r3, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:41:35 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x0) (fail_nth: 11)
00:41:35 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 53)
00:41:35 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 50)
[ 1417.261137] FAULT_INJECTION: forcing a failure.
[ 1417.261137] name failslab, interval 1, probability 0, space 0, times 0
[ 1417.262041] CPU: 1 PID: 13297 Comm: syz-executor.5 Not tainted 6.3.0-next-20230428 #1
[ 1417.262569] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1417.263116] Call Trace:
[ 1417.263304]
[ 1417.263478] dump_stack_lvl+0xc1/0xf0
[ 1417.263758] should_fail_ex+0x4b4/0x5b0
[ 1417.264057] should_failslab+0x9/0x20
[ 1417.264334] __kmem_cache_alloc_node+0x5b/0x310
[ 1417.264669] ? memcg_list_lru_alloc+0x248/0xb20
[ 1417.265006] ? memcg_list_lru_alloc+0x248/0xb20
[ 1417.265397] __kmalloc+0x4a/0x160
[ 1417.265660] memcg_list_lru_alloc+0x248/0xb20
[ 1417.265983] ? kmem_cache_alloc_lru+0xfd/0x600
[ 1417.266315] ? __pfx_memcg_list_lru_alloc+0x10/0x10
[ 1417.266694] kmem_cache_alloc_lru+0x125/0x600
[ 1417.267013] ? __d_alloc+0x31/0x9c0
[ 1417.267290] __d_alloc+0x31/0x9c0
[ 1417.267543] ? shmem_get_inode+0x6be/0xeb0
[ 1417.267862] d_make_root+0x49/0x120
[ 1417.268128] shmem_fill_super+0x7d7/0xe30
[ 1417.268423] ? __pfx_shmem_fill_super+0x10/0x10
[ 1417.268751] vfs_get_super+0xf0/0x280
[ 1417.269030] vfs_get_tree+0x92/0x360
[ 1417.269326] path_mount+0x1335/0x1e40
[ 1417.269616] ? kasan_quarantine_put+0x81/0x1d0
[ 1417.269949] ? __pfx_path_mount+0x10/0x10
[ 1417.270248] ? putname+0x102/0x140
[ 1417.270510] ? kmem_cache_free+0xff/0x4a0
[ 1417.270809] ? putname+0x102/0x140
[ 1417.271082] __x64_sys_mount+0x286/0x310
[ 1417.271384] ? __pfx___x64_sys_mount+0x10/0x10
[ 1417.271721] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1417.272106] do_syscall_64+0x3f/0x90
[ 1417.272381] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1417.272740] RIP: 0033:0x7f242be6304a
[ 1417.273001] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1417.274195] RSP: 002b:00007f24293d6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1417.274704] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f242be6304a
[ 1417.275177] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1417.275652] RBP: 00007f24293d7040 R08: 00007f24293d7040 R09: 00000000200000c0
[ 1417.276126] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1417.276601] R13: 0000000020000000 R14: 00007f24293d7000 R15: 0000000020000040
[ 1417.277116]
00:41:48 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 59)
00:41:48 executing program 2:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_tables_targets\x00')
sendfile(r0, r0, 0x0, 0x1ff)
r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00')
read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001400)={r0, 0x40, 0x5000000000, 0xff})
fchmod(r2, 0xc)
sendmsg$unix(r1, &(0x7f00000013c0)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001340)=[{&(0x7f00000000c0)="41b391142b6587f01c905bfd9680cb270a84b708f084025930d41d9c93ff33c6720f3fe9810d5b0b3ae6ebffad5500fc42c7ab16b9243d0d6e2183aa", 0x3c}, {&(0x7f0000000100)="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", 0x1000}, {&(0x7f0000001100)="0f280644b80e11961065ecb1ad64c2", 0xf}, {&(0x7f0000001140)="67b78e9a554102e59a8c4b8789e62962b0f7b3493814b44f0514ce667c2f8e", 0x1f}, {&(0x7f0000001180)="4aa09dad9f918973cb1a56d4b36f2533020f68f0ea69eb560edb6b68a73a740693dcd187e5e93ae1e4176bcd71aede32659c4fec01aca92fce09c7790b4d94aef9405087e7b234db11cfdd8445326f81912c632af4c0d026bb9da3672f3d986bdbef86b1f60c270233858264fdc09accfb553cb23fa8b14e29551bc551af61a146c453ca29017e73c3b53612ecbd96b883edaeac77506eae77b3fe92d6433cad96f38887e0cbf4f39f5e671d5829324526c05540", 0xb4}, {&(0x7f0000001240)="b80f85831468f7f408ee9f8c2829d06ac1085d38e2c392b2ba7ac56f5007da8731c8c747a557a29ed42ffda37fe9f2afa97c9d0f966a867a36b53de51b5349459d927bfa311706327838ade5588f92d3bd15f447ac81d3ce98028ff1e868dd8c3877c2af3a3bde4dcb42a0197d5e8b6456840690ace1412b7f97a018c1caed1e7b7d82b3766d9fbfdbf78e54fe7638eea3c0dce17fb745876512b8a32ee484883741e962254fc803b8b5f7aa073eebf12a460a2f1a34a7c7273a06716af8e1c6355730feb04a377546424867db27c533e1308277dcee850b8c39f87da56cf9dec98459519e87b30be1f8ed", 0xeb}], 0x6, 0x0, 0x0, 0x20000044}, 0x40)
00:41:48 executing program 3:
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
r2 = getpid()
clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[r0, r0, r2], 0x3}, 0x58)
r3 = fork()
r4 = getpgid(r3)
syz_open_procfs(r4, &(0x7f0000000000)='sessionid\x00')
sched_rr_get_interval(r4, &(0x7f0000000040))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0))
open(&(0x7f00000015c0)='./file1\x00', 0x28000, 0x40)
fcntl$getown(r1, 0x9)
00:41:48 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 54)
00:41:48 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x6000000, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:41:48 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 51)
00:41:48 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r3, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:41:48 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x0) (fail_nth: 12)
00:41:48 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x0) (fail_nth: 13)
00:41:48 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 52)
00:41:48 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 55)
00:41:48 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 60)
[ 1430.920892] FAULT_INJECTION: forcing a failure.
[ 1430.920892] name failslab, interval 1, probability 0, space 0, times 0
[ 1430.921724] CPU: 1 PID: 13424 Comm: syz-executor.5 Not tainted 6.3.0-next-20230428 #1
[ 1430.922257] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1430.922804] Call Trace:
[ 1430.922987]
[ 1430.923154] dump_stack_lvl+0xc1/0xf0
[ 1430.923438] should_fail_ex+0x4b4/0x5b0
[ 1430.923746] should_failslab+0x9/0x20
[ 1430.924019] __kmem_cache_alloc_node+0x5b/0x310
[ 1430.924363] ? memcg_list_lru_alloc+0x518/0xb20
[ 1430.924704] ? memcg_list_lru_alloc+0x518/0xb20
[ 1430.925047] __kmalloc+0x4a/0x160
[ 1430.925300] memcg_list_lru_alloc+0x518/0xb20
[ 1430.925674] ? kmem_cache_alloc_lru+0xfd/0x600
[ 1430.926015] ? __pfx_memcg_list_lru_alloc+0x10/0x10
[ 1430.926401] kmem_cache_alloc_lru+0x125/0x600
[ 1430.926742] ? __d_alloc+0x31/0x9c0
[ 1430.927021] __d_alloc+0x31/0x9c0
[ 1430.927271] ? shmem_get_inode+0x6be/0xeb0
[ 1430.927598] d_make_root+0x49/0x120
[ 1430.927870] shmem_fill_super+0x7d7/0xe30
[ 1430.928176] ? __pfx_shmem_fill_super+0x10/0x10
[ 1430.928507] vfs_get_super+0xf0/0x280
[ 1430.928792] vfs_get_tree+0x92/0x360
[ 1430.929077] path_mount+0x1335/0x1e40
[ 1430.929365] ? kasan_quarantine_put+0x81/0x1d0
[ 1430.929716] ? __pfx_path_mount+0x10/0x10
[ 1430.930032] ? putname+0x102/0x140
[ 1430.930312] ? kmem_cache_free+0xff/0x4a0
[ 1430.930614] ? putname+0x102/0x140
[ 1430.930904] __x64_sys_mount+0x286/0x310
[ 1430.931222] ? __pfx___x64_sys_mount+0x10/0x10
[ 1430.931562] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1430.931963] do_syscall_64+0x3f/0x90
[ 1430.932255] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1430.932617] RIP: 0033:0x7f242be6304a
[ 1430.932896] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1430.934173] RSP: 002b:00007f24293d6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1430.934728] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f242be6304a
[ 1430.935250] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1430.935756] RBP: 00007f24293d7040 R08: 00007f24293d7040 R09: 00000000200000c0
[ 1430.936267] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1430.936776] R13: 0000000020000000 R14: 00007f24293d7000 R15: 0000000020000040
[ 1430.937318]
00:41:49 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r3, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:41:49 executing program 2:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040))
mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0)
r0 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2/binder-control\x00', 0x1800, 0x0)
ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="000000084e7c4cbc093c0c7055cafad105af6500000000002e2f66696c653000"])
mremap(&(0x7f0000e34000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil)
mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f00009b8000/0x1000)=nil)
fork()
00:41:49 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x7000000, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
[ 1430.983492] FAULT_INJECTION: forcing a failure.
[ 1430.983492] name failslab, interval 1, probability 0, space 0, times 0
[ 1430.984288] CPU: 1 PID: 13440 Comm: syz-executor.4 Not tainted 6.3.0-next-20230428 #1
[ 1430.984841] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1430.985383] Call Trace:
[ 1430.985574]
[ 1430.985744] dump_stack_lvl+0xc1/0xf0
[ 1430.986037] should_fail_ex+0x4b4/0x5b0
[ 1430.986340] should_failslab+0x9/0x20
[ 1430.986618] __kmem_cache_alloc_node+0x5b/0x310
[ 1430.986950] ? __list_lru_init+0xcb/0x610
[ 1430.987257] ? __list_lru_init+0xcb/0x610
[ 1430.987554] __kmalloc+0x4a/0x160
[ 1430.987818] __list_lru_init+0xcb/0x610
[ 1430.988117] alloc_super+0x8f3/0xb00
[ 1430.988397] sget_fc+0x142/0x7a0
[ 1430.988647] ? __pfx_set_anon_super_fc+0x10/0x10
[ 1430.988993] ? __pfx_shmem_fill_super+0x10/0x10
[ 1430.989324] vfs_get_super+0x2d/0x280
[ 1430.989620] vfs_get_tree+0x92/0x360
[ 1430.989900] path_mount+0x1335/0x1e40
[ 1430.990189] ? kasan_quarantine_put+0x81/0x1d0
[ 1430.990520] ? __pfx_path_mount+0x10/0x10
[ 1430.990827] ? putname+0x102/0x140
[ 1430.991091] ? kmem_cache_free+0xff/0x4a0
[ 1430.991402] ? putname+0x102/0x140
[ 1430.991681] __x64_sys_mount+0x286/0x310
[ 1430.991997] ? __pfx___x64_sys_mount+0x10/0x10
[ 1430.992347] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1430.992725] do_syscall_64+0x3f/0x90
[ 1430.992999] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1430.993366] RIP: 0033:0x7f140720e04a
[ 1430.993658] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1430.994838] RSP: 002b:00007f1404781fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1430.995395] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f140720e04a
[ 1430.995903] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1430.996415] RBP: 00007f1404782040 R08: 00007f1404782040 R09: 00000000200000c0
[ 1430.996921] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1430.997456] R13: 0000000020000000 R14: 00007f1404782000 R15: 0000000020000040
[ 1430.998009]
[ 1443.612846] FAULT_INJECTION: forcing a failure.
[ 1443.612846] name failslab, interval 1, probability 0, space 0, times 0
[ 1443.613897] CPU: 1 PID: 13548 Comm: syz-executor.0 Not tainted 6.3.0-next-20230428 #1
[ 1443.614421] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1443.614950] Call Trace:
[ 1443.615133]
[ 1443.615291] dump_stack_lvl+0xc1/0xf0
[ 1443.615563] should_fail_ex+0x4b4/0x5b0
[ 1443.615852] ? security_inode_alloc+0x38/0x160
[ 1443.616168] should_failslab+0x9/0x20
[ 1443.616435] kmem_cache_alloc+0x5a/0x390
[ 1443.616725] security_inode_alloc+0x38/0x160
[ 1443.617042] inode_init_always+0xbb2/0xea0
[ 1443.617341] alloc_inode+0x84/0x240
[ 1443.617606] new_inode+0x25/0x1f0
[ 1443.617852] proc_pid_make_inode+0x26/0x230
00:42:01 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x0) (fail_nth: 14)
00:42:01 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 53)
00:42:01 executing program 2:
r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f540)={0x0, ""/256, 0x0, 0x0})
ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f00000001c0)={0xb744e870, 0x3, 0x6, 0x0, 0xfffffff7})
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000597c0)={0x0, [], 0xff, "3e3b3204ece552"})
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000597c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0xff, "3e3b3204ece552"})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8})
ioctl$AUTOFS_IOC_READY(r0, 0x9360, 0xdc)
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0x1f, &(0x7f0000000640)=0x0)
r5 = syz_open_dev$tty1(0xc, 0x4, 0x1)
io_submit(r4, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000600)="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", 0x6ba}])
r6 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)=0xe, 0x100800)
ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5000943f, &(0x7f0000000cc0)={{r6}, 0x0, 0x2, @unused=[0x3, 0x1000, 0x1, 0xfd], @devid})
00:42:01 executing program 3:
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
r2 = getpid()
clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[r0, r0, r2], 0x3}, 0x58)
r3 = fork()
r4 = getpgid(r3)
syz_open_procfs(r4, &(0x7f0000000000)='sessionid\x00')
sched_rr_get_interval(r4, &(0x7f0000000040))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0))
open(&(0x7f00000015c0)='./file1\x00', 0x28000, 0x40)
fcntl$getown(r1, 0x9)
00:42:01 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 56)
00:42:01 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x8000000, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:42:01 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 61)
[ 1443.618156] proc_pident_instantiate+0x85/0x320
[ 1443.618654] proc_pident_lookup+0x1da/0x270
[ 1443.619015] lookup_open.isra.0+0x74e/0x1400
[ 1443.619397] ? __pfx_lookup_open.isra.0+0x10/0x10
[ 1443.619757] ? __pfx_down_write+0x10/0x10
[ 1443.620041] ? __mnt_want_write+0x1f4/0x2e0
[ 1443.620351] path_openat+0x97c/0x2750
[ 1443.620624] ? __pfx_path_openat+0x10/0x10
[ 1443.620914] ? __pfx_perf_trace_lock_acquire+0x10/0x10
[ 1443.621277] do_filp_open+0x1ba/0x410
[ 1443.621549] ? __pfx_do_filp_open+0x10/0x10
[ 1443.621855] ? expand_files+0x446/0x8e0
[ 1443.622144] ? find_held_lock+0x2c/0x110
[ 1443.622437] ? __pfx_kfree_link+0x10/0x10
[ 1443.622738] ? _raw_spin_unlock+0x1e/0x40
[ 1443.623027] ? alloc_fd+0x2eb/0x760
[ 1443.623300] do_sys_openat2+0x171/0x4c0
[ 1443.623583] ? __pfx_do_sys_openat2+0x10/0x10
00:42:01 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r3, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
[ 1443.623919] __x64_sys_openat+0x143/0x200
[ 1443.624284] ? __pfx___x64_sys_openat+0x10/0x10
[ 1443.624638] ? ksys_write+0x1a7/0x260
[ 1443.624916] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1443.625272] do_syscall_64+0x3f/0x90
[ 1443.625539] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1443.625900] RIP: 0033:0x7f66595d6b19
[ 1443.626161] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1443.627340] RSP: 002b:00007f6656b4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[ 1443.627844] RAX: ffffffffffffffda RBX: 00007f66596e9f60 RCX: 00007f66595d6b19
[ 1443.628323] RDX: 0000000000000840 RSI: 0000000020000080 RDI: ffffffffffffff9c
[ 1443.628799] RBP: 00007f6656b4c1d0 R08: 0000000000000000 R09: 0000000000000000
[ 1443.629271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 1443.629752] R13: 00007fffe152e69f R14: 00007f6656b4c300 R15: 0000000000022000
[ 1443.630242]
[ 1443.684695] FAULT_INJECTION: forcing a failure.
[ 1443.684695] name failslab, interval 1, probability 0, space 0, times 0
[ 1443.684957] CPU: 0 PID: 13556 Comm: syz-executor.7 Not tainted 6.3.0-next-20230428 #1
[ 1443.684996] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1443.685015] Call Trace:
[ 1443.685027]
[ 1443.685043] dump_stack_lvl+0xc1/0xf0
[ 1443.685100] should_fail_ex+0x4b4/0x5b0
[ 1443.690000] should_failslab+0x9/0x20
[ 1443.690051] __kmem_cache_alloc_node+0x5b/0x310
[ 1443.690099] ? get_mountpoint+0x14b/0x3e0
[ 1443.690163] kmalloc_trace+0x26/0xc0
[ 1443.690214] get_mountpoint+0x14b/0x3e0
[ 1443.690261] lock_mount+0xeb/0x2f0
[ 1443.690311] ? vfs_create_mount+0x36e/0x490
[ 1443.690368] path_mount+0x14d6/0x1e40
[ 1443.690438] ? kasan_quarantine_put+0x81/0x1d0
[ 1443.690491] ? __pfx_path_mount+0x10/0x10
[ 1443.690542] ? putname+0x102/0x140
[ 1443.690587] ? kmem_cache_free+0xff/0x4a0
[ 1443.696607] ? putname+0x102/0x140
[ 1443.696678] __x64_sys_mount+0x286/0x310
[ 1443.696739] ? __pfx___x64_sys_mount+0x10/0x10
[ 1443.696809] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1443.698900] do_syscall_64+0x3f/0x90
[ 1443.698948] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1443.698993] RIP: 0033:0x7f6ff74eb04a
[ 1443.699021] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1443.702717] RSP: 002b:00007f6ff4a5efa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1443.702755] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6ff74eb04a
[ 1443.702780] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1443.702802] RBP: 00007f6ff4a5f040 R08: 00007f6ff4a5f040 R09: 00000000200000c0
[ 1443.702826] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1443.702849] R13: 0000000020000000 R14: 00007f6ff4a5f000 R15: 0000000020000040
[ 1443.702931]
00:42:01 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r3, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:42:01 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 57)
00:42:01 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x9000000, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:42:01 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r3, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:42:01 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 54)
00:42:01 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x0) (fail_nth: 15)
00:42:01 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 62)
00:42:01 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r3, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:42:01 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00')
read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9)
openat(r0, &(0x7f0000000000)='./file0\x00', 0xc0000, 0x40)
perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
00:42:02 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 63)
00:42:02 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0xa000000, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
[ 1443.980935] FAULT_INJECTION: forcing a failure.
[ 1443.980935] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1443.981781] CPU: 1 PID: 13677 Comm: syz-executor.7 Not tainted 6.3.0-next-20230428 #1
[ 1443.982310] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1443.982857] Call Trace:
[ 1443.983039]
[ 1443.983195] dump_stack_lvl+0xc1/0xf0
[ 1443.983475] should_fail_ex+0x4b4/0x5b0
[ 1443.983772] _copy_to_user+0x2e/0x150
[ 1443.984051] simple_read_from_buffer+0xd0/0x170
[ 1443.984377] proc_fail_nth_read+0x19c/0x230
[ 1443.984686] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 1443.985025] ? security_file_permission+0xb5/0xe0
[ 1443.985370] vfs_read+0x260/0x940
[ 1443.985626] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 1443.985965] ? __pfx_vfs_read+0x10/0x10
[ 1443.986246] ? __fget_files+0x270/0x480
[ 1443.986552] ksys_read+0x12b/0x260
[ 1443.986803] ? __pfx_ksys_read+0x10/0x10
[ 1443.987097] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1443.987466] do_syscall_64+0x3f/0x90
[ 1443.987736] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1443.988098] RIP: 0033:0x7f6ff749c69c
[ 1443.988349] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48
[ 1443.989529] RSP: 002b:00007f6ff4a5f170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 1443.990041] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f6ff749c69c
[ 1443.990513] RDX: 000000000000000f RSI: 00007f6ff4a5f1e0 RDI: 0000000000000005
[ 1443.991022] RBP: 00007f6ff4a5f1d0 R08: 0000000000000000 R09: 00000000200000c0
[ 1443.991538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 1443.992046] R13: 00007ffceff4b17f R14: 00007f6ff4a5f300 R15: 0000000000022000
[ 1443.992575]
00:42:02 executing program 1:
socket$nl_generic(0x10, 0x3, 0x10)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r2, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:42:02 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 55)
00:42:02 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x0) (fail_nth: 16)
00:42:02 executing program 3:
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
r2 = getpid()
clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[r0, r0, r2], 0x3}, 0x58)
r3 = fork()
r4 = getpgid(r3)
syz_open_procfs(r4, &(0x7f0000000000)='sessionid\x00')
sched_rr_get_interval(r4, &(0x7f0000000040))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0))
open(&(0x7f00000015c0)='./file1\x00', 0x28000, 0x40)
fcntl$getown(r1, 0x9)
[ 1444.131215] FAULT_INJECTION: forcing a failure.
[ 1444.131215] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1444.132566] CPU: 1 PID: 13691 Comm: syz-executor.0 Not tainted 6.3.0-next-20230428 #1
[ 1444.133085] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1444.133629] Call Trace:
[ 1444.133807]
[ 1444.133971] dump_stack_lvl+0xc1/0xf0
[ 1444.134247] should_fail_ex+0x4b4/0x5b0
[ 1444.134537] _copy_to_user+0x2e/0x150
[ 1444.134821] simple_read_from_buffer+0xd0/0x170
[ 1444.135153] proc_fail_nth_read+0x19c/0x230
[ 1444.135452] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 1444.135788] ? security_file_permission+0xb5/0xe0
[ 1444.136128] vfs_read+0x260/0x940
[ 1444.136380] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 1444.136718] ? __pfx_vfs_read+0x10/0x10
[ 1444.137012] ? __fget_files+0x270/0x480
[ 1444.137314] ksys_read+0x12b/0x260
[ 1444.137597] ? __pfx_ksys_read+0x10/0x10
[ 1444.137886] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1444.138247] do_syscall_64+0x3f/0x90
[ 1444.138518] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1444.138871] RIP: 0033:0x7f665958969c
[ 1444.139125] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48
[ 1444.140299] RSP: 002b:00007f6656b4c170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 1444.140836] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f665958969c
[ 1444.141301] RDX: 000000000000000f RSI: 00007f6656b4c1e0 RDI: 0000000000000003
[ 1444.141802] RBP: 00007f6656b4c1d0 R08: 0000000000000000 R09: 0000000000000000
[ 1444.142283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 1444.142765] R13: 00007fffe152e69f R14: 00007f6656b4c300 R15: 0000000000022000
[ 1444.143256]
00:42:14 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 58)
00:42:14 executing program 3:
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
r2 = getpid()
clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[r0, r0, r2], 0x3}, 0x58)
r3 = fork()
r4 = getpgid(r3)
syz_open_procfs(r4, &(0x7f0000000000)='sessionid\x00')
sched_rr_get_interval(r4, &(0x7f0000000040))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0))
open(&(0x7f00000015c0)='./file1\x00', 0x28000, 0x40)
fcntl$getown(r1, 0x9)
00:42:14 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x0)
00:42:14 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 56)
00:42:14 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]})
00:42:14 executing program 1:
socket$nl_generic(0x10, 0x3, 0x10)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r2, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:42:14 executing program 2:
mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
r1 = openat(r0, &(0x7f0000000140)='./file1\x00', 0x523101, 0x80)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080))
pwritev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="1d2fbe6a7627246a73a08cbe51983c5c8348bea6279621f8d31df9a50b55bc59381440ec1dc56ca73d006a00bf013fb6af51fbcecaee963f54215934a6eee419d2e6b0716835d5ea6666a5dbf6e6c531860cee10d933207bb2d967642c670431b97a9e002c319dca70d87736378d3305ede6a2058d29a7f5f4de8545813c1c7080027d7fc4412234b4eb6066f8d329fe65e6835413acbf6b576ea581c01b03ffb6e5e44e107596e95edd9f51bc1034fa5f4dfbb7a50727", 0xb7}, {&(0x7f0000000240)="c911a797025b28e93b14f8e63c75dd9899f7258ce9a2b5c56da42f80061d0d49727fd25ca64ea945dfeeb91b5bc083ffb706810035ad657a3c44eaa0a0f3632f8ef082a5c005b315d4d0b47d065e9708b0caad425261df281c5720323bfc3873d50fbb6f380cb471409ede4a3bc0ebc8b685eb7b100faaa05ef542b5a96536", 0x7f}, {&(0x7f00000002c0)="8f9a01b52e78271e7c34b390d7f0b4713cb393b9aa888162274fc360a244c071a75d34487dc08951b205f9cc88c6228eb39656dce284583b8ea47ac3570d4ed16f2ef343d0", 0x45}, {&(0x7f0000000340)="b746cb7781ba1764a50504f1fc48fadff14aa93589b925ddcdb4f79aa41511e2aed14acc15763d881db529d902bb5ee34a0282853a20650ce358e60e4fabd3c25599a077c1c9c643c5fff2d5e9f49744a917c75131dac509d951b88e455398424d9ca7e07e83cf", 0x67}], 0x4, 0x7, 0x8000)
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x2000000)
r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000400), 0x240, 0x0)
ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000440)=0x4000)
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x800000)
00:42:14 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0xb000000, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:42:14 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 59)
[ 1456.773317] FAULT_INJECTION: forcing a failure.
[ 1456.773317] name failslab, interval 1, probability 0, space 0, times 0
[ 1456.774215] CPU: 1 PID: 13825 Comm: syz-executor.4 Not tainted 6.3.0-next-20230428 #1
[ 1456.774770] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1456.775333] Call Trace:
[ 1456.775526]
[ 1456.775699] dump_stack_lvl+0xc1/0xf0
[ 1456.775997] should_fail_ex+0x4b4/0x5b0
[ 1456.776300] should_failslab+0x9/0x20
[ 1456.776593] __kmem_cache_alloc_node+0x5b/0x310
[ 1456.776927] ? shmem_fill_super+0x7b/0xe30
[ 1456.777238] kmalloc_trace+0x26/0xc0
[ 1456.777517] shmem_fill_super+0x7b/0xe30
[ 1456.777831] ? __pfx_set_anon_super_fc+0x10/0x10
[ 1456.778193] ? __pfx_shmem_fill_super+0x10/0x10
[ 1456.778531] vfs_get_super+0xf0/0x280
[ 1456.778833] vfs_get_tree+0x92/0x360
[ 1456.779104] path_mount+0x1335/0x1e40
[ 1456.779390] ? kasan_quarantine_put+0x81/0x1d0
[ 1456.779717] ? __pfx_path_mount+0x10/0x10
[ 1456.780017] ? putname+0x102/0x140
[ 1456.780273] ? kmem_cache_free+0xff/0x4a0
[ 1456.780577] ? putname+0x102/0x140
[ 1456.780853] __x64_sys_mount+0x286/0x310
[ 1456.781147] ? __pfx___x64_sys_mount+0x10/0x10
[ 1456.781484] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1456.781895] do_syscall_64+0x3f/0x90
[ 1456.782160] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1456.782526] RIP: 0033:0x7f140720e04a
[ 1456.782809] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1456.784088] RSP: 002b:00007f1404781fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1456.784632] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f140720e04a
[ 1456.785155] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1456.785673] RBP: 00007f1404782040 R08: 00007f1404782040 R09: 00000000200000c0
[ 1456.786193] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1456.786705] R13: 0000000020000000 R14: 00007f1404782000 R15: 0000000020000040
[ 1456.787247]
00:42:28 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x2)
00:42:28 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]})
00:42:28 executing program 3:
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
r2 = getpid()
clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[r0, r0, r2], 0x3}, 0x58)
r3 = fork()
r4 = getpgid(r3)
syz_open_procfs(r4, &(0x7f0000000000)='sessionid\x00')
sched_rr_get_interval(r4, &(0x7f0000000040))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0))
open(&(0x7f00000015c0)='./file1\x00', 0x28000, 0x40)
fcntl$getown(r1, 0x9)
00:42:28 executing program 1:
socket$nl_generic(0x10, 0x3, 0x10)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r2, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:42:28 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0xf000000, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:42:28 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 57)
00:42:28 executing program 2:
ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg1\x00'})
keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000340)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="601c6d6b646f7366d8a02b0008b3a8000440002000f8", 0x16}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
00:42:28 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 60)
[ 1470.658353] FAULT_INJECTION: forcing a failure.
[ 1470.658353] name failslab, interval 1, probability 0, space 0, times 0
[ 1470.659205] CPU: 1 PID: 13932 Comm: syz-executor.5 Not tainted 6.3.0-next-20230428 #1
[ 1470.659752] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1470.660323] Call Trace:
[ 1470.660516]
[ 1470.660693] dump_stack_lvl+0xc1/0xf0
[ 1470.660987] should_fail_ex+0x4b4/0x5b0
[ 1470.661304] ? alloc_vfsmnt+0x23/0x6c0
[ 1470.661599] should_failslab+0x9/0x20
[ 1470.661902] kmem_cache_alloc+0x5a/0x390
[ 1470.662216] alloc_vfsmnt+0x23/0x6c0
[ 1470.662503] vfs_create_mount+0x8f/0x490
[ 1470.662815] path_mount+0x149b/0x1e40
[ 1470.663114] ? kasan_quarantine_put+0x81/0x1d0
[ 1470.663456] ? __pfx_path_mount+0x10/0x10
[ 1470.663756] ? putname+0x102/0x140
[ 1470.664030] ? kmem_cache_free+0xff/0x4a0
[ 1470.664347] ? putname+0x102/0x140
[ 1470.664629] __x64_sys_mount+0x286/0x310
[ 1470.664940] ? __pfx___x64_sys_mount+0x10/0x10
[ 1470.665299] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1470.665697] do_syscall_64+0x3f/0x90
[ 1470.665995] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1470.666373] RIP: 0033:0x7f242be6304a
[ 1470.666651] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1470.667914] RSP: 002b:00007f24293d6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1470.668444] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f242be6304a
[ 1470.668958] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1470.669465] RBP: 00007f24293d7040 R08: 00007f24293d7040 R09: 00000000200000c0
[ 1470.669971] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1470.670483] R13: 0000000020000000 R14: 00007f24293d7000 R15: 0000000020000040
[ 1470.671006]
00:42:28 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0)
sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:42:28 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]})
00:42:28 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x10000000, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:42:28 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 58)
00:42:28 executing program 2:
sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000)
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0x4]}, 0x8, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r2, 0x301, 0x0, 0x0, {0xf}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0)
sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x48, r2, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x9}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x3}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x2}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x4)
syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x1cb182)
00:42:28 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0)
sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:42:28 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x3)
00:42:44 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 59)
00:42:44 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]})
00:42:44 executing program 3:
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
r2 = getpid()
clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[r0, r0, r2], 0x3}, 0x58)
r3 = fork()
r4 = getpgid(r3)
syz_open_procfs(r4, &(0x7f0000000000)='sessionid\x00')
sched_rr_get_interval(r4, &(0x7f0000000040))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0))
open(&(0x7f00000015c0)='./file1\x00', 0x28000, 0x40)
fcntl$getown(r1, 0x9)
00:42:44 executing program 2:
sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000)
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0x4]}, 0x8, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r2, 0x301, 0x0, 0x0, {0xf}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0)
sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x48, r2, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x9}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x3}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x2}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x4)
syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x1cb182)
00:42:44 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x11000000, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:42:44 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0)
sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:42:44 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x4)
00:42:44 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 61)
00:42:44 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 62)
00:42:44 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 60)
00:42:44 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x8)
00:42:44 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r2, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:42:44 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x13000000, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:42:44 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]})
00:42:44 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 63)
00:42:44 executing program 2:
io_setup(0xd29, &(0x7f0000000780)=0x0)
io_setup(0x1f, &(0x7f0000000640)=0x0)
r2 = syz_open_dev$tty1(0xc, 0x4, 0x1)
io_submit(r1, 0x5, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000600)="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", 0x6c0}])
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_timeval(r3, 0x1, 0x1b, &(0x7f0000000200), 0x10)
r4 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0)
r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r5, 0x4004662b, &(0x7f0000000340))
setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000480)=@gcm_256={{0x303}, "a6be6235bf9337f2", "4003e78878519ea6f4b0ae884bd953820c1111e99405d38cd9fd76dec64c0fb6", 'nNsu', "65cbf9129e49630a"}, 0x38)
r6 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_timeval(r6, 0x1, 0x1b, &(0x7f0000000200), 0x10)
io_submit(r1, 0x3, &(0x7f0000000440)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x6, 0x5, r3, &(0x7f0000000140)="d3012b9dc9a932e89f4c06f068123082d687d5d5dac03a4268b3081759fa42479b45f82c617c7dba39da59f28d7c968891957f43b8b1dd2480a29f31ed1c70dc6e61c58aab928eee6395c9e321e8a1144e90ee13b37d74c9c82015ee7d76e5338972ed68f72a9f44b1c5dec3afd349c56f7c17c0e2516ec131cdb874e84d62e6364a5680270424b0e09fac038dab48fe92550d", 0x93, 0xc4, 0x0, 0x1}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0x8a4d, 0xffffffffffffffff, &(0x7f0000000240)="f97c51c100bf4bcc84fe579aabfff46c26d6cc671ca77ed079af54e29305211436b0bcebf1e75b24d84de94bd6bcbe2f1d66b1cf5ae9a1ed8d63aded8e067137d5f9bcfa29f8329a10271e1a744a3783e5eafee372b8bface042851b8dae1a305a63cc726ddac777", 0x68, 0x10001, 0x0, 0x1, r4}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x7, 0xfffa, r6, &(0x7f0000000300)="31ae560e0b4198a7bb56c8de51d3348350e5a686bef1b190f962f1bc5c139fecf8e12913ce75b824e7ff5ddc3fb4d09b1c479a74f807b2cabb0b3e71f8d58293e197331c899a06393d73cf8571e3152ad225ee62dfcb72f8d7f6723e7632160955e74092e141c4d4b7eccbf3acecb8e51e085c4db1bcc748206af9b84de73939c4d7918e245e4924558406bf2902ae282482af801c66d5d2efe9d4cfeb8823b02fce7ed0a049e20ceef5903f5894b114479557619f07b21dce61c60bc59bb0fd2854923effbfafca25bd135af7f08e8e0f621126a0b0c73afedbc97ff55cff2d", 0xe0, 0x1, 0x0, 0x1}])
r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1255c2, 0x0)
io_submit(r0, 0x1, &(0x7f0000000040)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x7, 0x0, r7, &(0x7f0000000000)="1c", 0xf}])
[ 1486.767395] FAULT_INJECTION: forcing a failure.
[ 1486.767395] name failslab, interval 1, probability 0, space 0, times 0
[ 1486.767447] CPU: 0 PID: 14106 Comm: syz-executor.4 Not tainted 6.3.0-next-20230428 #1
[ 1486.767466] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1486.767477] Call Trace:
[ 1486.767483]
[ 1486.767491] dump_stack_lvl+0xc1/0xf0
[ 1486.767518] should_fail_ex+0x4b4/0x5b0
[ 1486.767555] should_failslab+0x9/0x20
[ 1486.767579] kmem_cache_alloc_lru+0x6b/0x600
[ 1486.767602] ? shmem_alloc_inode+0x27/0x50
[ 1486.767627] ? __pfx_lock_release+0x10/0x10
[ 1486.767659] shmem_alloc_inode+0x27/0x50
[ 1486.767683] ? __pfx_shmem_alloc_inode+0x10/0x10
[ 1486.767711] alloc_inode+0x63/0x240
[ 1486.767733] new_inode+0x25/0x1f0
[ 1486.767757] shmem_get_inode+0x183/0xeb0
[ 1486.767798] shmem_fill_super+0x708/0xe30
[ 1486.767824] ? __pfx_shmem_fill_super+0x10/0x10
[ 1486.767844] vfs_get_super+0xf0/0x280
[ 1486.767870] vfs_get_tree+0x92/0x360
[ 1486.767900] path_mount+0x1335/0x1e40
[ 1486.767935] ? kasan_quarantine_put+0x81/0x1d0
[ 1486.767962] ? __pfx_path_mount+0x10/0x10
[ 1486.767987] ? putname+0x102/0x140
[ 1486.768009] ? kmem_cache_free+0xff/0x4a0
[ 1486.768038] ? putname+0x102/0x140
[ 1486.768074] __x64_sys_mount+0x286/0x310
[ 1486.768104] ? __pfx___x64_sys_mount+0x10/0x10
[ 1486.768139] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1486.768169] do_syscall_64+0x3f/0x90
[ 1486.768191] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1486.768214] RIP: 0033:0x7f140720e04a
[ 1486.768227] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1486.768244] RSP: 002b:00007f1404781fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1486.768263] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f140720e04a
[ 1486.768274] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1486.768286] RBP: 00007f1404782040 R08: 00007f1404782040 R09: 00000000200000c0
[ 1486.768298] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1486.768309] R13: 0000000020000000 R14: 00007f1404782000 R15: 0000000020000040
[ 1486.768349]
00:42:57 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 61)
00:42:57 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x18)
00:42:57 executing program 3:
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
r2 = getpid()
clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[r0, r0, r2], 0x3}, 0x58)
r3 = fork()
r4 = getpgid(r3)
syz_open_procfs(r4, &(0x7f0000000000)='sessionid\x00')
sched_rr_get_interval(r4, &(0x7f0000000040))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0))
open(&(0x7f00000015c0)='./file1\x00', 0x28000, 0x40)
fcntl$getown(r1, 0x9)
00:42:57 executing program 2:
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file1'}, 0xb)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0)
signalfd4(r1, &(0x7f0000000140), 0x8, 0x80000)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
write(r2, &(0x7f0000000200)='E', 0x140000)
00:42:57 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 64)
00:42:57 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x60010000, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:42:57 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]})
00:42:57 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r2, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
[ 1499.531924] FAULT_INJECTION: forcing a failure.
[ 1499.531924] name failslab, interval 1, probability 0, space 0, times 0
[ 1499.532995] CPU: 0 PID: 14205 Comm: syz-executor.5 Not tainted 6.3.0-next-20230428 #1
[ 1499.533690] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1499.534409] Call Trace:
[ 1499.534655]
[ 1499.534875] dump_stack_lvl+0xc1/0xf0
[ 1499.535241] should_fail_ex+0x4b4/0x5b0
[ 1499.535645] should_failslab+0x9/0x20
[ 1499.536007] __kmem_cache_alloc_node+0x5b/0x310
[ 1499.536444] ? get_mountpoint+0x14b/0x3e0
[ 1499.536837] kmalloc_trace+0x26/0xc0
[ 1499.537195] get_mountpoint+0x14b/0x3e0
[ 1499.537589] lock_mount+0xeb/0x2f0
[ 1499.537937] ? vfs_create_mount+0x36e/0x490
[ 1499.538365] path_mount+0x14d6/0x1e40
[ 1499.538751] ? kasan_quarantine_put+0x81/0x1d0
[ 1499.539202] ? __pfx_path_mount+0x10/0x10
[ 1499.539605] ? putname+0x102/0x140
[ 1499.539949] ? kmem_cache_free+0xff/0x4a0
[ 1499.540352] ? putname+0x102/0x140
[ 1499.540722] __x64_sys_mount+0x286/0x310
[ 1499.541116] ? __pfx___x64_sys_mount+0x10/0x10
[ 1499.541562] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1499.542057] do_syscall_64+0x3f/0x90
[ 1499.542419] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1499.542905] RIP: 0033:0x7f242be6304a
[ 1499.543252] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1499.544805] RSP: 002b:00007f24293d6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1499.545471] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f242be6304a
[ 1499.546093] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1499.546744] RBP: 00007f24293d7040 R08: 00007f24293d7040 R09: 00000000200000c0
[ 1499.547371] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1499.547994] R13: 0000000020000000 R14: 00007f24293d7000 R15: 0000000020000040
[ 1499.548648]
[ 1499.558968] FAULT_INJECTION: forcing a failure.
[ 1499.558968] name failslab, interval 1, probability 0, space 0, times 0
[ 1499.560501] CPU: 1 PID: 14208 Comm: syz-executor.4 Not tainted 6.3.0-next-20230428 #1
[ 1499.561544] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1499.562634] Call Trace:
[ 1499.562995]
[ 1499.563322] dump_stack_lvl+0xc1/0xf0
[ 1499.563870] should_fail_ex+0x4b4/0x5b0
[ 1499.564458] should_failslab+0x9/0x20
[ 1499.565007] kmem_cache_alloc_lru+0x6b/0x600
[ 1499.565625] ? shmem_alloc_inode+0x27/0x50
[ 1499.566221] ? __pfx_lock_release+0x10/0x10
00:42:57 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x27)
[ 1499.566858] shmem_alloc_inode+0x27/0x50
[ 1499.567639] ? __pfx_shmem_alloc_inode+0x10/0x10
[ 1499.568315] alloc_inode+0x63/0x240
[ 1499.568840] new_inode+0x25/0x1f0
[ 1499.569357] shmem_get_inode+0x183/0xeb0
[ 1499.569980] shmem_fill_super+0x708/0xe30
[ 1499.570577] ? __pfx_shmem_fill_super+0x10/0x10
[ 1499.571228] vfs_get_super+0xf0/0x280
[ 1499.571782] vfs_get_tree+0x92/0x360
[ 1499.572328] path_mount+0x1335/0x1e40
[ 1499.572902] ? kasan_quarantine_put+0x81/0x1d0
[ 1499.573553] ? __pfx_path_mount+0x10/0x10
[ 1499.574138] ? putname+0x102/0x140
[ 1499.574801] ? kmem_cache_free+0xff/0x4a0
[ 1499.575399] ? putname+0x102/0x140
[ 1499.575936] __x64_sys_mount+0x286/0x310
[ 1499.576521] ? __pfx___x64_sys_mount+0x10/0x10
[ 1499.577183] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1499.577915] do_syscall_64+0x3f/0x90
[ 1499.578461] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1499.579166] RIP: 0033:0x7f140720e04a
[ 1499.579677] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1499.582004] RSP: 002b:00007f1404781fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1499.583027] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f140720e04a
[ 1499.583959] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1499.584898] RBP: 00007f1404782040 R08: 00007f1404782040 R09: 00000000200000c0
[ 1499.585834] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1499.586771] R13: 0000000020000000 R14: 00007f1404782000 R15: 0000000020000040
[ 1499.587765]
00:42:57 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x80ffffff, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:42:57 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]})
00:42:57 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r2, @ANYBLOB="26003300b080000008021100000008021100000150505050505000000400"/40], 0x44}}, 0x0)
00:42:57 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 62)
00:42:57 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x48)
[ 1499.748121] FAULT_INJECTION: forcing a failure.
[ 1499.748121] name failslab, interval 1, probability 0, space 0, times 0
[ 1499.749182] CPU: 0 PID: 14222 Comm: syz-executor.5 Not tainted 6.3.0-next-20230428 #1
[ 1499.749883] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1499.750658] Call Trace:
[ 1499.750905]
[ 1499.751133] dump_stack_lvl+0xc1/0xf0
[ 1499.751504] should_fail_ex+0x4b4/0x5b0
[ 1499.751892] should_failslab+0x9/0x20
[ 1499.752251] __kmem_cache_alloc_node+0x5b/0x310
[ 1499.752681] ? get_mountpoint+0x14b/0x3e0
[ 1499.753098] kmalloc_trace+0x26/0xc0
[ 1499.753451] get_mountpoint+0x14b/0x3e0
[ 1499.753829] lock_mount+0xeb/0x2f0
[ 1499.754174] ? vfs_create_mount+0x36e/0x490
[ 1499.754595] path_mount+0x14d6/0x1e40
[ 1499.754975] ? kasan_quarantine_put+0x81/0x1d0
[ 1499.755409] ? __pfx_path_mount+0x10/0x10
[ 1499.755799] ? putname+0x102/0x140
[ 1499.756142] ? kmem_cache_free+0xff/0x4a0
[ 1499.756533] ? putname+0x102/0x140
[ 1499.756885] __x64_sys_mount+0x286/0x310
[ 1499.757274] ? __pfx___x64_sys_mount+0x10/0x10
[ 1499.757712] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0
[ 1499.758209] do_syscall_64+0x3f/0x90
[ 1499.758577] entry_SYSCALL_64_after_hwframe+0x72/0xdc
[ 1499.759042] RIP: 0033:0x7f242be6304a
[ 1499.759387] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1499.760930] RSP: 002b:00007f24293d6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 1499.761602] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f242be6304a
[ 1499.762226] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000
[ 1499.762863] RBP: 00007f24293d7040 R08: 00007f24293d7040 R09: 00000000200000c0
[ 1499.763488] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000200000c0
[ 1499.764109] R13: 0000000020000000 R14: 00007f24293d7000 R15: 0000000020000040
[ 1499.764771]
00:43:11 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]})
00:43:11 executing program 3:
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
r2 = getpid()
clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[r0, r0, r2], 0x3}, 0x58)
r3 = fork()
r4 = getpgid(r3)
syz_open_procfs(r4, &(0x7f0000000000)='sessionid\x00')
sched_rr_get_interval(r4, &(0x7f0000000040))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0))
open(&(0x7f00000015c0)='./file1\x00', 0x28000, 0x40)
fcntl$getown(r1, 0x9)
00:43:11 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan1\x00'})
sendmsg$NL80211_CMD_FRAME(r1, 0x0, 0x0)
00:43:11 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 65)
00:43:11 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x840, 0x4c)
00:43:11 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x1, 0x9effffff, 0x0, {{@in=@loopback}, @in=@private, {@in, @in=@broadcast}, {{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@sec_ctx={0xc, 0x8, {0xfffffffffffffd30}}]}, 0x134}}, 0x0)
00:43:11 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) (fail_nth: 63)
00:43:11 executing program 2:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0})
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f540)={0x0, ""/256, 0x0, 0x0})
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f540)={0x0, ""/256, 0x0, 0x0})
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000597c0)={0x0, [{0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, r7}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {r5}, {0x0, 0x0}, {}, {}, {0x0}, {0x0, r7}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {r5}, {}, {0x0}, {0x0, 0x0}, {0x0, r7}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r7}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0,